Top 7 Computer Security Mistakes People Make
Without the legitimate information, you possibly put your framework in danger to the reiteration of digital assaults out there.
How long do you spend on the web? A great many people don’t know about how long they really spend on the web. There was a review directed in the UK that found that the typical resident spent around five hours daily on the web, excluding the time they spent while at work. It additionally found that individuals matured somewhere in the range of 16 and 24 spent more than 2,000 hours consistently on Instagram alone.
Actually, over the natural course of time, increasingly more of our lives is moving over to the cloud.
We do just about everything online, whether it’s stream video content, shop, access out bank accounts, speak to friends and family, share photos and files, track our daily fitness journey or speak to a medical professional through hundreds of different apps designed for these tasks. We do all of these from a handful of devices, such as are mobile phones, tablets, wearable gadgets and PCs.
All of these different things have their own security implications. As they all require username and passwords, so ways of keeping track of all this data is a must. Some people look to minimise the complications of it all, by simply using the same passwords over and over – which only makes their security situation more vulnerable. Other users may decide to just ignore the security warnings altogether.
Below are 7 computer mistakes you do not want to make
IMG_1
- Reusing Weak Passwords
Of the many common security mistakes, reusing weak passwords has to be amongst the top. A weak password is comprised of only a few letters, making it easy to either crack or guess. Once a hacker guesses right, they’ll proceed to use the same username and password across many platforms.
Any password that you use should be long, unique and complex. You should also use a password manager to keep track of everything.
- Writing Your Passwords Down
This is another common one – many users love to write their password down on a sticky note and position it near their computer – which defeats the purpose totally. A lot more people have their passwords written down somewhere than you’d think. Which is definitely understandable, when you consider how complex a password needs to be, if you don’t want someone easily guessing it. However, that doesn’t mean it is okay to do.
One way of getting around this is to use seamless sign-ins. Which means, you sign in the once, from which, you can access all other accounts. Using a passphrase is also encouraged, as they are easy to remember, and much more relevant than using randomised numbers and letters.
Having a policy designed to curtail the use of common passwords will also help to mitigate risk. Enabling self-service password reset is another consideration, as it will make it easier to reset a password in the event that it’s compromised.
- Falling Victim to Phishing Scams
Phishing is something that has been around for an impressive time span, but on the other hand is proceeding to rise. Over the long haul, they have become more complicated, making it challenging to identify. Thus it’s vital that the end client has at any rate some comprehension of what he/she is facing.
To protect yourself from these scams, you’ll need the correct security measures in place. The first thing you can do is stop or block malicious attachments in your emails. If you’re a company, then you don’t want them getting to your employees email boxes. You also want to have a security policy in place that limits email spread, in the event that a phishing email is able to get through.
Another thing you should do is train either yourself or employees in phishing scams – what they are and how to detect them.
- Leaving Webcam On
Webcam hacks are very common and are a serious violation of one’s privacy. There is malware that a user can put on your system, which will grant them remote access to your system, which in turn will allow them to enable your webcam. The camera on your computer or laptop doesn’t have the same security protections like other network related hardware devices. For you, you will need to learn how to tell when your web cam is on or off. You can also consider putting a piece of tape on it, when you’re not using it then taking it off, when you are.
- Using Work Devices for Personal Use
With this new era of remote (and in some instances hybrid) working, it has led to people spending more time logged onto the internet. The unfortunate reality is that it has led to more and more people using their corporate devices for personal use, whether it be streaming content, downloads, shopping or even gaming. This effectively puts the employer at risk, potentially harming the company, especially if malware is able to get onto the computer, granting a hacker access to an entire corporate network.
To minimise this risk, users should consider separating their work from play, by using their corporate machine exclusively for work. Your own personal laptop, smartphone or PC should be used for all the fun stuff.
- Not Using Internet Security Software
Most computer owners appreciate the security that the best internet protection software brings. But a surprising low number of end users actually take the time to download and install such software. This inevitably leaves your mobiles, laptops and PCs vulnerable to hidden malware when they visit certain websites.
Our lives online have become almost equally as important to the lives we live in the real world. For this reason, we should seek to protect it. You should therefore go out and find reputable security software you can install on your system.
- Not Updating or Restarting Your System
It’s very important that you turn your system off from time to time. This could be for a multitude of reasons. Such as security updates – most of them require at least a system restart to fully initiate. You also have software updates, restarting and sometimes powering your system down are required to carry out such an update.
Also, when it comes to performance related issues – in most cases the recommendation will be to turn your system off for several seconds, then power it back on. Restarting also clears your RAM, which frees up resources for other tasks.
So what can you do to fix it? Well, there are group policies that can be set to automatically carry out updates after a reboot. This ensures computer systems are kept up to date.
–AUTHOR INFO—
Uchenna Ani-Okoye is a former IT Manager who now runs his own computer support website https://www.compuchenna.co.uk