Effective Ways to Protect PC from Internet Threats

28 Jan

Technology has enhanced our lives in ways that was unbelievable – even unimaginable – for people until a few decades ago. Computer gadgets, for example, have become our most valued possessions, almost akin to the mythical spirit animals. Who is slaved to whom is a topic that needs a separate discussion altogether, but we can all agree that computers and the internet are changing the world for good.

On the flip side, the danger of increasing threat landscape in the internet is a sword that hangs above our digital future. Cyber-crime is internet’s underbelly that is frustrating and counterproductive to our lives. Criminals are hell-bent on misusing personal and corporate data to make illegal gains. And the sad truth is; anyone with a PC and mobile devices are a likely target.


While security solutions are far better than what we had until a few years ago, hackers are also employing sophisticated new techniques to breach security parameters and impinge damage. Staying ahead of the curve definitely helps, but how to go about it? Below, we present to you a few ways in which you can ensure security for your computer devices and digital assets. Read and share your opinions in the comment section at the end of the article.

Shield Your Devices with Security Software

The number rule to cybersecurity is to have all the necessary tools required to make your online experience secure. You can buy an antivirus (AV) to keep virus attacks at bay, or buy a powerful security suite at yearly subscription that offers a host of safety features. Some people like to cherry-pick programs and customize their computer protection, so they buy stand-alone Antivirus, firewall, internet security, anti-spyware, etc. to build their own security circuit.

Nowadays, many vendors including Comodo offer such security program at free-of-cost or as a “freemium” service. You just have to ensure you the products you get comes packed with good features and from a trusted brand.

Keep Your Computer Up-to-date

It’s not enough to have all security software installed in your computer and leave it to gather dust. Installing software’s in your PC is like buying home appliances that needs routine cleaning and maintenance, and sometimes, even an upgrade. One of the many ways that cyber-criminals infiltrate computers is through outdated software’s such as Operating Systems (OS), AVs, device drivers, browser plug-ins and extensions, and all other programs you can think of.

Updating softwares keeps them abreast of the latest virus definitions and equips them with the patches required to safeguard them against incoming threats. Out-of-date softwares, on the other hand, simply don’t have the mechanism to fight against latest threats.

Secure Your Devices in the Real-world

It’s easy to be biased and assume that cybercrime only exists at a digital level, but the fact is a majority of identify theft and hacking happens in the physical world. It is as important to safeguard your devices in the physical world as it is in the virtual cyber space. InfoSec experts advice not to leave your devices unguarded at public places, setting passcode to access a device and apps, and not using public (read: free) wi-fi zones to carry out financial transactions.

For Android smartphones, a great way to consolidate data safety is to have an app that can be used to remotely lock your mobile or wipe personal information in it, even if its get stolen or lost.

Back-up your Precious Data

Back up exactly a security measure in itself, but it fights the odds against data loss in case of an unfortunate happening. It’s like an insurance policy against a possible house fire. The trick is to do it religiously, and not assuming that you will be fine if you back-up your data later. You can back-up your important data in an external hard drive, CD, or an online space. Suppose an unforeseen incident happens and you lose most of your data, the archived data will help you rebound normally without wasting of time.

Lately, many email providers such as Google and Hotmail offer free cloud space up to a certain space storage limit for their users. Another option is to go with cloud vendors who offer cloud space for a trial period, and eventually for monthly or yearly fee. The good thing about such a service is that they encrypt their cloud storage against possible threats.

Stay Alert

In addition to all the preventive/offensive techniques discussed above, there are a variety of other activities you can do to protect yourself against data theft. Amid our busy everyday schedule, we sometimes tend to overlook simple security cautions like clicking on an email attachment without much thought and getting a virus infection as a result of it. We can avert the traps laid in phishing emails by applying a little common sense to gauge its content. Similarly, tweak the web browsers’ privacy settings to seal the vulnerabilities of your computer against cookies, adware, and spyware. You can also enable the pop-up blocker in the browser to prevent any malvertising attempts from giving you a problem.

Above all, turn on the User Account Control (UAC) so that every change that takes place in your PC requires your approval, and hence, stops malware’s from making unauthorized changes even if they are able to infiltrate your system.

Leave a comment

Posted by on January 28, 2016 in Internet Security


Tags: , , ,

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: