https://invisiblesecurity.blogspot.com/ https://knowledgeanitivirus.blogspot.com/ https://easydatasolutionshere.blogspot.com/ https://anitvirusecurity.blogspot.com/ Tech-Talk: 8 Good Digital Security Practices for Virus Protection by Antivirus Software

8 Good Digital Security Practices for Virus Protection by Antivirus Software

 

8 Good Digital Security Practices for Virus Protection by Antivirus Software


What would originally be a presentation for a workshop became a post, the 8 good practices on digital security for all audiences:

1. Use and update Antivirus

In general, one of the biggest fears of digital users is being the victim of a computer virus, but in response to this fear, few users have an antivirus installed and updated. Having an antivirus and not updating it is having a door and not closing it. That is, an antivirus to protect you depends on being updated in its databases on new viruses. Here are a couple of reliable and free antivirus that you can download (Yes also Mac users need an antivirus, they don't have super powers).

·         AVG

·         Protegent 360 Antivirus Software

·         Avast ( Windows and Mac )

2. Strong passwords

Passwords became our main defense barrier against a digital intruder, let's think about it for a moment; Before starting to talk about servers and large internet security systems, the first thing that exists in this chain of services is our password for emails or social networks.

3 tips to follow to have a secure password

·         Use a password with more than 8 characters in length.

·         Combine the phrase using capital letters and numbers.

·         Try to change your passwords on a regular basis.

And finally and essential do not share or publish your passwords anywhere.

3. Log out of all the devices you use.

It does not matter if it is a phone, a laptop or a rented device, after using email or a social network, try to close the session you opened. Many times we leave our computers unattended and we can be the victims of some joke or worse, information theft.

4. Use https in your connections

The HTTPS service is a secure communication protocol between computers that means that not all the information that travels over the internet travels safely and can be seen by others, that includes your passwords. One way to understand how https works is with the following graphic, in the first case the information can be read by everything, in the second example it is the same search but nothing can be understood.


5. Put lock code to devices

It does not matter if it is a desktop, laptop or cell phone of any type, we must enable the code lock option to protect our information from some data "thief". If you do not know how to do it, we will share some tricks for all operating systems.

·         Windows

·         Mac

·         Android

6. Backup information from your devices

It might seem basic but it is common to hear stories of people who lost all their information due to a failure of some component of their equipment. Most people do not take it as an important activity, but in a moment of failure or breakdown they will know its importance. A backup does not have to be complex; it really must meet some basic rules:

·         It should be as up to date as possible, preferably no more than a month

·         You must back up the most valuable or indispensable thing that you consider within your files.

·         A backup is a copy of information; therefore it is not for daily reference use.

·         Keep the storage device in a safe place from theft or mishaps (water, variable temperatures, drops or misuse)

Now let's talk about social media and some good habits.

7. Accept and share only with those people you know

It is very common to find users of all kinds of tastes, interests or activities throughout social networks, but really, what do we know about people on social networks? In other words, in social networks we share all kinds of information but we must be careful who can access it; a good practice is to keep our profiles private and accept those people we know.

8.  Periodically check the applications linked to your accounts

Many of us use our network profiles to access different internet services, or we register them on some pages to be able to share our interests with other people. All applications that have permission from us or that we link at some point can publish content on our behalf regardless of the registration date. In other words, our profile can use them to send messages to other users of the same social network. To avoid this or to control the applications that we have registered, we can periodically review our profiles to do so; here you can see a video for Facebook.

 

No comments:

Post a Comment