Computers house so much of our personal data that it’s essential to set up protective measures in case of cyber attack or mechanical failure. These five must-do steps dramatically increase the odds your computer (and your privacy) will remain safe from the latest online criminal activity and let you salvage your most important files if your computer becomes irretrievably infected.
1. Updates are not optional
Updating the software on your system, including the operating system, is an absolute necessity. If you don’t download new versions of programs like Adobe Flash, your computer is more susceptible to malware. Updates to your Windows or Mac operating system help address new threats.
To keep your Windows system up to date, you can use Windows Update to make sure you’re getting the necessary adjustments. This is usually set to update automatically, but here’s how can check to make sure.
In Windows 7, click the Start button, type “windows update” into the search box. Click on Windows Update in the results (it will be under the Program section of the results.) Click on “Change Settings” in the Windows Update window that pops up and then check to see that the Install Updates Automatically option has been selected under Important Updates section. Then choose OK to save your changes.
In Windows 8,open the Search charm, enter “turn automatic updating on or off” and then click Settings. Microsoft issues new updates every second Tuesday of the month.
Mac OS X checks automatically for updates weekly if it has an internet connection. If it finds updates, will it use a pop up window listing the changes and asking you if you are ready to install them (which often requires a computer restart).
2. Uninstall Java
Java is a program that websites used to incorporate into their systems, but is rarely used now. Continuous security holes allowing malware to infect computers through Java makes it no longer safe to leave it on your system unless you absolutely need it. Even the Department of Homeland Security has recommended removing Java from your computer or, at least, disabling it in your browser.
We recently posted a step-by-step guide to identifying if your system has Java installed and what you need to do to remove or disable it. We cannot stress enough the importance of uninstalling Java for the health and security of your computer.
How to disable or uninstall Java?
The easiest and most certain way to protect yourself is simply to uninstall Java, as you would any other other program. If you don’t need Java, and most people do not, this is the safest course. If you encounter a program in the future that requires Java to run, you will be prompted to reinstall it, and you can decide whether or not to do so.
UPDATE 1/14/13:Uninstalling Java may not remove the plug-in from your browser. After the uninstall, we recommend you check your individual browser settings as outlined below, as well.
For Windows users, the latest version of Java, Version 7 Update 10, also allows you to disable Java in all of your browsers through the Java Control Panel. Find the Java icon from within the Windows Control Panel, go to the Security Tab and uncheck “Enable Java content in the browser”
Mac users and Windows users with earlier versions of Java who wish to disable Java should follow the instructions below for individual browsers.
•Click on the Tools dropdown menu, then Manage Add-ons.
•Find the Java Plug-in under Toolbars and Extensions (it’s listed under Oracle America), highlight it and click Disable.
•Click on the Chrome menu, and then select Settings
•At the bottom of Settings window, click Show advanced settings
•Scroll down to the Privacy section and click on Content Settings
•In the Content Settings panel, scroll to the Plug-ins section and click Disable individual plug- ins.
•Find the Java plugin and click Disable
•Click on the Firefox tab and then select Add-ons
•Select Plugins, find “Java (TM) Platform plugin” and click Disable (a of 1/11/13, Firefox has automatically disabled the Java plugin, but you should check to verify this has been done for your browser).
•Choose Safari Preferences
•Choose the Security option and uncheck Enable Java
What if I need to use Java?
Use of Java on websites is becoming more rare and most users will never need to use it. However, there are certain applications that do require Java (such as the online trading app some use). If you need to use Java, you can set your Java security settings to require a prompt before running any Java apps. You can do this through the custom security setting from within the Security tab in the Java Control Panel.
Alternatively, you can turn off Java in your standard browser (e.g., Chrome), but keep it turned on in an alternative browser (e.g., Firefox) that you only use to access those sites where Java is required.
3. Install malware protection
Trojans, viruses, keyloggers, zombie code, spyware, adware and more are continuously finding new ways to make it onto your PC. But many people are infected by malware that has been around for years, simply because they don’t have decent security software installed.
Malwarebytes is a solid malware protector, especially adept at removing all sorts of things that shouldn’t be on your system. If you don’t want to spend any money, there are very good free antivirus programs available , like Microsoft Security Essentials.
Macs are not safe from these kinds of attacks either. A recent study judged the effectiveness of many top security software programs for the Mac against a virus that made the rounds on the Apple computer. Check out the results for a listing of recommended security programs for your Mac.
4. Use strong passwords
Many of us just use one or two passwords for all the sites we visit. Who can keep track of a couple dozen unique passwords anyway? But if one of those sites gets hacked and they were ot using proper encryption techniques (as happened with the LinkedIn and eHarmony hack in 2012), criminals will now have your password for Amazon, eBay, PayPal, or even your online bank.
There us a simple three-step solution: 1) Make strong passwords. 2) Use different passwords for each site. 3) Use a password management system to track them all.
A strong password usually should have at least 8 characters (the longer the better), with a mixture of upper and lower-case letters, numbers and, if the site or service allows, special characters, such as “!,” “#” and “?.” But it should also be something you can easily remember. And that conflict has led too many people to use common passwords that are easy to hack.
The good news is that recent studies have shown password length may be more important than whether you’re using fancy characters. So the password “IgrewupinBrooklyn” may actually be incredibly difficult to crack. Not sure if your password is strong enough? Here’s how to check your password strength.
Password management systems come in many forms. There’s one built into the Mozilla Firefox browser and many Internet security programs come with that feature as well (such as Norton’s Internet Security 2013.) 1Password ($49.95 at agilewebsolutions.com) is a popular stand alone program that works across many of your devices including computers, tablets and smartphones.
Also, consider lying when creating password security questions. Public information that can be Googled (the street you grew up on, your grandmother’s maiden name, etc.) makes you an easy target for hackers trying to get your password.
5. Back it up
When your system is infected beyond repair or compromised and wiped, you need to have a backup of your critical documents so they’re not lost for ever..Your two major back up solutions are online storage and external hard drives.
The major cloud-based storage services offer a few gigabytes for free with a cost to get access to more. If you back up thousands of large files, like photos and videos, you may have to pay a monthly fee. Cloud-based storage is perfect for saving important can’t-lose documents and the best of your photos. Backing up is as simple as signing up for one of the services and then putting your documents into a special folder on your desktop that will sync to your cloud storage or marking which folders on your hard drive you want to sync.
You can access your files from anywhere with a computer, tablet or phone and an Internet connection. Many also let you sync files between devices, so it’s like having a cloud-based storage and external hard drive storage at the same time.
Most of the cloud-based storage services provide encryption of files while they transfer from your computer to their servers, but the files will usually be stored unencrypted on the server. If you want an extra level of privacy protection, consider a program that encrypts files before uploading them.
External hard drive backup:
The external hard drive option is better for instant access to very large files or if you have tons of files and don’t want to pay a monthly fee (you can get a 500GB WD hard drive on Amazon for around $60). But if a fire, flood or theft takes out your home computer, it will likely destroy your external hard drive, as well. So we always recommend using a backup drive in conjunction with cloud-based storage for your most important files.
Hope these tips help
Have a Great Week!