Computer Security

Exhead

An ounce of prevention is worth a pound of cure

Computers can be enormous timesavers and powerful financial tools. Using budget tracking software, paying bills online and buying items for less from wholesale or auction sites can make a lot of sense.

But before you load up your computer with sensitive information about yourself, you'll want to take the necessary steps to ensure your personal finances stay personal. Here's how to keep your computer on lockdown and off limits to identity thieves.

1. Use passwords for protection
You wouldn't leave sensitive documents laying out for prying eyes; likewise, you need to put away the information stored on your computer in a safe place: locked behind a password in your own user account.

Even if you are a true Luddite and never intend to go online, you'll still want to password protect your computer. That's because if you have a snoopy houseguest or if a thief picks up your laptop, they could get at your information as you sleep if it's not password protected.

Set up a separate user account for others to surf on so you keep your sensitive information private.

HOW TO: For Windows-based machines, go into the control panel, choose user accounts and follow the instructions. Mac users must create a password upon using the computer for the first time and they can change their password settings by going into system preferences. There they can disable automatic login. (If you get stuck, ask a trusted techie for assistance. That goes for all these tips.)

2. Get your guard up
Before merging with the information superhighway, you're going to want to make sure that all the existing security settings your computer comes with are turned on. If you want to go out and buy added protection later, that's great. Just make sure you have basic protection enabled before going online.

First, fire up the firewall. Your computer should come with a firewall, or perhaps a software package came bundled with your purchase that includes a firewall. It's basically a set of programs that work together to enforce the safety rules you outline when you choose a security level. The firewall is the gatekeeper for Internet activity.

The default setting is usually on, but you'll want to verify that it's on if you don't see the firewall icon when you turn on the computer.

Go into the control panel to find the security settings. The higher you set your security, the more you are going to screen out, dangerous and harmless. Medium to medium-high is fine for most people.

3. Up the 'anti' with software
Next, up the anti -- antivirus and antispyware. These can be packaged separately or together. Spyware is software installed surreptitiously by outsiders on your computer that stealthily collects information as you navigate the Internet. Only some spyware is actually malicious; the spyware that marketers use is sometimes called adware. Viruses are pervasive and pernicious.

Malwarebytes Anti-Malware & Microsoft Security Essentials are recommended software and have free versions.

4. Run scans to stay current
Unlike fashion, keeping up with computer security trends is easy. Just set automatic updates and let them run.

From the time the computer is boxed until you bring it home and plug it in, a lot can change: Either new threats arise or security flaws are detected in the software, so it is important to get the updates immediately.

5. Take wireless precautions
Even if you're a giving person, you can't afford to share your wireless connection with the neighbors. Letting people piggyback on your connection sucks up bandwidth, slowing you down. Worse: They could potentially see everything on your computer.

If you don't turn on wireless encryption, a neighbor who's only halfway computer savvy could easily put something on your PC that would track your keystrokes. This means that even if you're logging onto a secure site, they would be able to record the keystrokes and go back and log in later.

It's very tempting to buy a wireless router, plug it in and be up and running within a matter of minutes, but realize that by default the firewall component of that router might not be on. Encryption is almost certainly not on.

HOW TO: The typical wireless router will have local area network, or LAN, ports in which you plug in wires connecting to your computer. That's how you can initially install your updates to the wireless software.

Encrypt. Usually the router will come with a CD that has installation software and the installation software should have a tab on it for security and should show you how to set up encryption. You may be able to choose from various types of encryption. If so, choose WPA, or its newer variant, WPA2, as they're considered more secure than the older WEP encryption.

Always rename your connection from the default name. Your connection is called the service set identifier, or SSID, which is the name of a local wireless area network. It's a case-sensitive string of text with up to 32 characters. You want to call it something that won't identify you, because this is what anyone in the area can see.

Choose a strong passphrase to password-protect your router. Don't worry about having to remember this long string of characters. You'll log in from your computer with something shorter. But do keep the passphrase in a secure place that you won't forget about.

It takes a few extra minutes to set it up upfront when you do it, but it ensures that rogues are not going to connect to your wireless network without you knowing about it.

6. Pump up password protocol
I'm constantly called upon to create passwords. How many do we repeat or name something ridiculously easy to guess? You'd be amazed at the number of people who actually use the word 'password' as their password. Not good.

Here are some rules for creating better passwords:

Don't make it personal: Passwords shouldn't be words from the dictionary, spouses' names, birthdays, Social Security numbers, things that people think are clever because they won't have to write them down. Once a thief gets that fundamental information, it's easier to figure out personal passwords.

Don't recycle: A lot of people will end up reusing a lot of the same username and password combinations, so oftentimes a hacker will gather in that information and use it successfully on other sites.

Good passwords should be composed of a combination of letters and numbers.

7. Attachments and downloads
If you've ever looked at spam and wondered how anyone could be fooled by the atrocious grammar and ridiculous promises, perhaps next time the joke will be on you. The messages are getting more polished and more targeted.
The web has seen a sharp increase over the last four years of targeted Trojans. These programs lurk inside something that appears innocuous, such as a Word document or spreadsheet. When that document is activated, the Trojan gets to work, perhaps shipping information out of the My Documents file. These usually get sent to a single individual via email, so they rarely get on the radar of the broader security community.

Never open or execute any e-mail attachment if you don't know the person. Consumers think that they can recognize a spam attack, but the attacks are becoming very regionalized and they look just like something you might expect to get from somebody. You shouldn't view, open, or even execute e-mail attachments unless you know the source, it's expected and you know the purpose of it.

Sometimes your friends are the unwitting messengers of malicious code. Even forwarded messages that legitimately come from friends might shuttle recipients to a dangerous URL where, there's a list of "20 ways to take your 30-year marriage and make it go to 60" and, while you're reading it, in the background a piece of code is slipped on your computer that will start taking information.

Tip: If you enjoy sharing jokes or feel-good messages that are sent to you, copy the information into the body of a new e-mail message rather than forwarding the attachment.

8. Avoid going public
Public cafes are great for surfing, but you really need to recognize the risk of inputting confidential information. There's not much you can do to improve information safety at a public computer. You're at greater risk because you're dependent upon on a third party for security.

Someone else who came in before you might have put in a flash stick that is gathering information.

I would seriously consider if you want to use a shared computer that remotely relates to confidential or identity information, simply because you don't know if it's got a keyword logger or if all the tracking is turned on on that machine.

It's a large risk that people really need to weigh. If there's no other access available and there's no other way of getting it done, you take the risk. But if it can wait until you can get home, it might behoove you to wait.

9. Watch your phones and PDAs
Remember, smart phones and PDAs are computers too, which raises two real risks: software security breaches and physical security breaches, such as when you lose the phone. Luckily, consumers can proactively find solutions to keep cell phones safe, just as on home computers.

You should always password lock your phone in case it goes MIA. That will make it harder for a thief to get at your information. Then, call your operator to have the phone locked, if possible, or your subscription canceled.

Threats to mobile software are growing, so it's important to protect yourself by downloading security software to your smart phone or PDA. Traditionally, crackers, the nickname for criminal hackers, haven't been much of a threat to cell phones because older models were essentially dumb boxes, but now the devices are getting smart -- and so are thieves.

Nowadays, we are carrying around what is essentially a mini-PC that also happens to be a phoner. Because it is that much smarter, it of course is that much more open to abuse. I think, from that perspective, all the same paranoia I would use with my PC, I would apply to my phone as well.

If you're going to engage in mobile banking, even though banks are trying to protect their customers on their end, you should have some sort of mobile security just as you have on your home computer.

The average consumer trusts their device. But as soon as you start putting confidential information -- passwords, identifiers -- that you're then going to send to the bank, that now becomes information either on your cell phone, at risk, or over the air, at risk.

People should know that what's sent over to them can be pulled out of the air. PDAs should never be used to send Social Security numbers or financial information. Same with cell phones, actually. I hear people all the time in public giving things, that first of all, anyone could overhear, but also that anyone with that kind of scanner could pull out of the air.

Be aware of the kinds of information you send over a PDA because it might not have the kinds of protections that you think it does. When in doubt, get to a landline or a secure computer.

10. Clean up after yourself
Before selling or recycling your old computer, wipe the system with a file scrubber. Simply deleting files and emptying the trash bin doesn't mean they can't be recovered by anyone motivated to uncover them.

Free versions of file scrubbers, also called disk wipes or data scrubbers, can be found by doing a quick online search.

More information on spyware tips »

I Can Help With Your Security Needs

If you would rather have someone do it for you

I can help you secure your computer, laptop, wireless connection or network. Contact me and let me provide you with an affordable quote for these services. If your computer has symptoms of spyware, or you have been unsuccessful at removing it by yourself - stop wasting time and schedule an appointment.

More information on email security »

Note: To keep spam to my inbox to a minimum I have chosen not to place an email contact on this website. To contact me for services you may call me using the phone number found above.