04 nov 2015

Security tips for PC and smartphone

This rather lengthy post provides an overview

 

More and more people are using PCs, notebooks and smartphones to access the Internet, surf, play games and check e-mail wherever they are. At the same time, the networking of Internet-enabled devices is increasing. Game consoles are networked with each other, the heating at home can be controlled via smartphone while on the move, and data travels from one device to another via Bluetooth.

This is accompanied by increasing security risks for your Exness stock trading. Criminals can try to gain unauthorized access to data. With these tips, you can increase the protection of your own device many times over.

The choice of browser

The German Federal Office for Information Security (BSI) recommends the Google Chrome browser for surfing the Internet. This differs from the competition in that it uses sandbox technology: an executable code is thereby separated from other processes, which should basically prevent hackers from accessing the entire PC via a security hole (e.g. in the ever problematic Flash player).

trading online

Install virus protection

Virus protection is considered essential basic protection against malicious attacks from the Internet. Numerous manufacturers such as Avira or AVG offer free versions in addition to more extensive paid versions to defend against dangerous files. Additional protection is provided by the operating system's firewall, which should never be switched off.

Create backups

Some hackers are not out to spy on data, but send out viruses, for example, which can paralyze your own computer. Regularly backing up relevant data protects against major losses and speeds up recovery in the event of damage. Clouds in which data can be backed up online are also practical. However, it is advisable to encrypt data before backing it up using programs such as Boxcryptor.

Work with different user accounts

Only the administrator has comprehensive access to all areas of the computer. For daily work, it is therefore recommended to set up an additional user account with limited rights.

Manage passwords

One way to create complex passwords for various applications and manage them is to use the LastPass program, for example. It runs on all kinds of platforms (Mac/Windows/Linux) and even fills in web forms automatically. One thing to keep in mind is that LastPass stores your encrypted passwords on its own servers. If you can do without the enormous feature set and prefer to store your passwords locally, you can try KeePass (on Windows).

Dealing with the hard disk

When selling a hard disk, many users are too careless with their own data. Simply deleting the files is not enough to remove them permanently. If destroying the hard drive is not possible, it is essential to perform a thorough cleanup to prevent hackers from recovering and misusing the data. Special software for secure data deletion can be downloaded from the Heise.de download portal. 

currency trade online

Beware of data collectors

Social networks such as Facebook and Google are constantly changing their settings, so it is important to regularly check whether the desired shares are still up to date. In addition, you should only log in to the services specifically - permanent log-ins simplify data collection enormously. Tracking by cookies can be countered in the browser settings: Firefox and Chrome offer the option to specifically prevent cookies from being saved.

Additional tips for the smartphone

There are additional regulations for smartphones that increase data security. Unknown numbers should be checked before calling back, and confidential conversations should be avoided even with known persons. Wireless interfaces such as Bluetooth and WLAN can be deactivated; when using public hotspots, it is also a good idea to install a VPN client. Security updates are just as obligatory for smartphones as they are for PCs.

Conclusion

A few settings can increase security many times over. Once installed, many programs offer better protection against attackers. Although this does not replace careful handling of data, most dangers can be averted quite quickly. An investment of time in the listed areas can be very worthwhile.


 

Leave a comment
More Posts
Comments
Comment

6952af3915ccf1f76b72585549722ff7