Internet Security

                        Tips for browsing internet safely
The concern for internet safety is a global phenomenon, mostly for those who are new-fangled to internet. While the prevalence of social networking websites, online communities and internet-enabled processes should be great news for individual, corporate and government users, the concern for safety remains a major source of concern. The 21st century is the age of computers and World Wide Web. Everyone starting from child to old is accustomed with web browsing. But the question arises how much we are safe on the internet? Hackers and malicious software is a great threat to our individual online privacy. So we need to protect our self from these dangerous aspects of internet. Following are some steps that can ensure a safe browsing practice. 
 1–Use Common Sense 
 To browse the internet safely, it’s best if you do so by using common sense. Do not click on advertisements that may harm your computer, and stay away from sites that promise “free” items, cash or other services simply by entering your personal information. Just because a website looks official, this does not mean that it can’t harm your computer.
2 – Use a Firewall 

 To improve the safety of your internet browsing, it’s highly recommended that you install some high-quality firewall software. Having a firewall can help prevent programs from infiltrating your computer, and may also protect against some hackers or internet criminals.
3- Use Strong Passwords

 Ensure data security by using strong passwords for your online accounts and your system files. Do not use your name or birth date as a password since they are easy to crack. Instead, use a password that contains alphanumeric characters and is at least eight characters long. Also, do not store passwords on your system. If remembering all your passwords is difficult, use a password manager program to organize and manage your passwords.
 4- Install Antivirus and Antispyware Tools 

 Use an antivirus and an antispyware tool to keep your system protected from malicious programs, such as viruses, worms, adware, and spyware. Configure these tools to perform regular full system scans on your computer.
5 – Be Aware 

When other people are using your computer, it’s best if you supervise their activities. Even if a friend asks to check their email, its best if you have them login under a other account that you have created for others to use. Having a Guest account on your computer enables you to allow others to use your computer without having to worry about them installing potentially malicious software. When creating a Guest account, disable sharing of important files on your computer. In addition to this, you should always make sure that any sensitive files are password-protected. Don’t load non-essential programs off the Internet, especially things like toolbars, screensavers, or video programs. These programs normally install extra, malicious software that causes problems and often requires a repair to remove effectively. Don’t click on anything in a pop-up and unsolicited links received in email, instant messages, or chat rooms, as it might install malware.
6- Do Not Open Attachments from Unsolicited Emails
Attachments that come with unwanted emails can contain malicious programs, such as viruses and worms. These malicious programs often cause severe damage to your system. Therefore, it is best that you straight away delete any unwanted emails you receive. You must also scan the attachments that you obtain from known sources before opening them.
7- Lock icon in the browser doesn’t means it’s secure

When the lock icon appears in the browser, many of us believe we are opening a secure site. This is because the lock icon indicates there is an SSL encrypted connection between the browser and the server to protect the personal sensitive information. However, it does not present any security from malware. In fact, it’s the reverse because most Web security products are totally blind to encrypted connections: it’s the perfect vehicle for malware to penetrate a machine. There have been many cases where hackers emulate bank, credit card sites complete with spoofed SSL certificates that are difficult for a user to identify as deceptive. So keep away from the unknown site which shows lock icon.
8- Keep your Operating System, Software, and Drivers Up-To-Date
     

0 comments: