Monday, October 3, 2011

Computer Security: The 3 Best Tips

In this article, I will explain 3 ways to diminish the risk of viruses getting on a computer. Malicious software may come from a variety of source; not only from the Internet. A common type gets installed on the computer through a USB key. The owner of the device might not even know about it, as it is possible for a user to send a virus to his/her USB memory stick without knowing it. Actions can be taken to lower the risks.

The first step towards a secure computer is to install a firewall and an anti-virus. It is very important to have both because they each have different tasks. A firewall will watch the data that is transferred between a computer and the world wide web and will notify the user, or take action, if it detects something abnormal. It may also keep an eye on what is happening between the different applications and services of the computer. For example, if a program tries to access the registry, a crucial part of a Windows operating system, the firewall can detect it, block it and advise the user.

An Anti-virus has other tasks. It checks the computer for any data that might constitute or be the result of a virus, a spybot, a trojan, etc. Instead of only blocking the actions, they will detect the problem and, if possible, remove it. It is important to schedule periodic scans, without what the software might be useless. All this might seem costly, but there are some free alternatives that do a similar job, if not sometimes better, than paid ones. I have used and personally recommend the following: For the antivirus, Avast is one of the good free ones you'll find. For the firewall, I'd suggest Comodo personnal firewall.

The second most important step is to keep your system updated. Operating systems and web browsers often have protocols in place to prevent viruses and hackers to access the computer. Anti-viruses and firewalls also have lists of data they have to block and delete. Unfortunately, malicious software evolve everyday and new ones emerge, not waiting for the old ones to go away. Most of the time, it's possible to set up automatic updates. If it's not the case for the software you are using, be sure to do it manually every now and then. An out-of-date anti-virus is almost as useless as not having any.

The final step is to back-up your data. The softwares mentioned above are not perfect and a day might come when something you don't want finds its way to your system. Having a second copy of your data is also good in the case of a hard drive technical problem. If a lot of files are created and work is done on a computer on a daily basis, it can be useful to have an automatic backup plan that takes action everyday. That may be a lot of hassle, so I'd suggest doing a weekly back-up of your data. A lot of software do recursive back-ups, meaning that they only copy the files and folders that have been created since the last time. To find the right software for you, you can check on Wikipedia. It has a list of both free and paid options.

As soon as these are set in place on a new computer, the risks of a destructive loss are greatly reduced. A good way to help the situation is by surfing the web with carefulness. Ignore sites that tell you that your computer has problem and that you need to download there special anti-virus to get rid of it. Try to also avoid warez, keygen and all other illegal-software related websites.

Source: http://EzineArticles.com/5248132

Thursday, September 29, 2011

Free Internet Security Programs


As the importance of the Internet in day-to-day life has increased, so has the need for Internet security. The lurking risk of viruses, spyware, Internet frauds, scams and identity thieves all point to this ever-growing need. A great way to ensure a smooth Internet experience is to install a good Internet security program. Free Internet security programs are the easiest and chosen route for many. There are numerous no-cost programs available, but one must choose reliable and popular software to get the best of both worlds.

Avast Home Edition
One of the biggest threats to an Internet-connected PC is the infamous virus. A good virus-protection software is a great way to secure your Internet expeditions. As one of the most popular free programs around, Avast Home Edition secures your PC against viruses proactively. The most noticeable feature of Avast is its boot-time antivirus scan, which detects and removes viruses at the time of system boot. The protection is real-time and proactive. If you hit a page with malicious program or codes, Avast instantly detects the malicious element(s) and alerts you so you can block the connection to that particular site. CNET rates this software with 5/5 stars.

Spyware Doctor
Spyware is a program that get installed on your computer and acts as a threat to personal information stored on your system. There is spyware that can relay the information back to the creators and can wreck havoc for you in more ways than one: Virtual criminals can steal bank passwords, Social Security numbers and any other sensitive information that is stored on your system. Spyware Doctor is an award-winning program that can detect and remove/block all kinds of spyware threats. Another benefit is the on-guard mechanism that monitors your PC for any threats on an ongoing basis automatically.

Zone Alarm
Zone Alarm is a firewall program that seeks to protect your PC from hackers and identity theft. The program controls your system's gateway to the Internet and provides access to programs you are familiar with and approve. Another feature is the Internet lock that blocks Internet traffic when the computer or Internet connection is not in use.

Advantages
There are various free Internet security programs on the market, including the ones mentioned above. Most of them have exceptional features and functions that are on par with paid software. Plus, a number of them have been tested by many popular reviewers such as CNET. If one opts to go for a free Internet security program, it's best to examine its reviews.

Disadvantages
Free software is the easiest and chosen route for many. However, one must consider the cons, as well, before installing free Internet security programs. There are many lesser-known software products that disguise themselves as free Internet security programs but they are really malware programs. These malware programs often contain hidden codes that may put your computer and all of your personal information within easy reach of hackers. This is a serious issue considering that the very program that you intend to use to secure yourself from Internet risks and frauds can be the instrument for breaching your security.

Considerations
Unlike most of the more reputable free programs out there which provide enough functionality to adequately protect your PC, some free programs are usually demo versions, which will not be effective after a specified period of time. In this case, you may have to make some payment to reactivate the program. For a hassle-free Internet experience, it is essential that there are some security measures intact on the system. Such limited access and functionality does no good for your Internet security. So, when searching for a free Internet security program, be sure to look for those that do not expire after a trial period.

Source: eHow

Wednesday, September 28, 2011

A strategic approach to IT security is essential


Cyber threats will always get ahead of defences, which is why organisations need a strategic approach, says Gartner analyst Lawrence Orans.

"Organisations need to be proactive in spotting threats and preventing or mitigating damage," he told the Gartner Security & Risk Management Summit 2011 in London.

The challenge for IT security professionals is choosing the best combination of proactive tools from five broad categories of network discovery, network behaviour analysis, specialised threat detection, penetration testing and network forensics.

Network discovery tools identify all devices connecting to a network, and typically highlight that 10% to 25% of network endpoints are unknown, said Orans.

"In some cases, organisations have found rogue wireless access points, cash registers, security cameras and gaming consoles connected to their networks," he said, all providing potential entry points for intruders.

Network behaviour analysis tools establish a baseline for a network's traffic and raise alerts whenever there are deviations from normal patterns.

These tools can help IT security professionals identify targeted attacks and to fine-tune intrusion detection and prevention systems and firewalls.

However, businesses that do not have predictable network traffic patterns may struggle with a high number of false positives, said Orans.

Penetration testing, he said, can be extremely valuable in getting the attention of senior management by highlighting vulnerabilities and demonstrating exposure to risk.

These tests are also useful in helping IT security professionals to identify internal threats and to prioritise the most dangerous vulnerabilities, said Orans, but 70% are outsourced because of the high skills requirement.

Network forensics also requires advanced skills and is still a very niche market that tends to be outsourced in the form of a service.

Such services enable organisations to capture all information on a network, which is useful for post-incident analysis to establish the cause and effects of cyber attacks, said Orans.

Organisations considering network forensics services should pay particular attention to how quickly stored events can be searched and analysed before choosing a supplier, he said.

Finally, specialised threat detection is aimed at providing businesses with assurances that they have not been targeted by threats such as spyware or advanced persistent threats (APTs).

This type of security software typically analyses the source of network traffic, examines the payload or looks at the traffic itself to see if it conforms to normal or expected patterns.

One of the biggest problems with specialised threat detection, said Orans, is that it requires highly skilled users and constant use to stay on top of rapidly evolving threats.

Apart from intelligence agencies or the like, few organisations will need all of these proactive security technologies, said Orans.

In choosing the most appropriate technology, organisations should assess the business impact of attack on each of their system to identify which are critical.

Tuesday, September 27, 2011

The Best Spyware & Security Programs


Spyware is a type of malware that secretly installs itself onto a computer without the owner's permission. The program slows the computer's network connection and puts strain on the computer's memory, tracks Internet activity on the computer, and can even redirect an Internet browser to go to a specific website. Spyware is hard to remove, but many anti-spyware and computer security programs are available for computer users to help get rid of infections.

Spy Sweeper:
Spy Sweeper rates in the top ten of many anti-spyware review lists, including TopTenReviews.com and PC Magazine. Spy Sweeper is a standalone anti-spyware tool, meaning that the program doesn't come equipped to handle any other kind of malware removal. Because spyware often evolves to become harder to detect, Spy Sweeper constantly evolves as well, being updated regularly to keep up with trends in spyware. Another perk of Spy Sweeper is that it utilizes a minimal amount of memory, making it easy to run undetected. Spy Sweeper runs as a real-time background scanner. The program comes with free Internet and phone technical support.

CounterSpy:
Sunbelt Software's CounterSpy ranks highly in anti-spyware products, as noted by PC World. CounterSpy protects Internet-connected computers from spyware infections by running quietly in the background. This program detects several different malware types, such as spyware, adware and rootkits. CounterSpy also acts as a privacy protection tool by erasing web browsing history. CounterSpy has a feature known as FirstScan that performs a complete deep scan of the computer upon start-up. The ease of use and high rate of spyware detection are what make CounterSpy a high-rated anti-spyware program.

PC Tools Internet Security 2010:
PC Tools offers a total Internet security system that rates well among computer authorities. This system features their Spyware Doctor software and anti-spam and anti-phishing protection, plus a Firewall and other browsing security features. Internet Security has a Browser Defender website that runs in real-time to detect potentially harmful sites and warn computer users against suspicious links. Internet Security runs in real time for maximum protection rates. In PC Magazine's testing, Internet Security scored 9.7 out of 10 for malware blocking.

Ad-Aware Pro:
Ad-Aware, created by Lavasoft, is an anti-malware program that offers real-time protection known as Ad-Watch Live against harmful infections. Ad-Aware Pro features two different modes--simple and advanced. Many users find they can stick with simple mode all the time, letting them do full scans or faster smart scans. Advanced mode is for specific configuration and scheduled scanning setup. This program protects against rootkits, spyware, and other malware. It will also clean Internet history for better privacy.


Source : eHow

Sunday, September 25, 2011

Best Practices for Backup & Recovery


Backup and recovery processes avoid data loss for you or your network users. You back up your files to an external storage device. These devices are used to recover any files or programs installed on the computer. Best practices secure your data and make it quicker for recovery.

1.Significance
Backups are often neglected, since a network server or computer generally functions properly. However, if the hard drive crashes, servers containing critical components such as a database or user permission settings are no longer able to handle client requests. This causes businesses to lose money in employee performance. If websites are attached to the server's database, your online website won't function.

2.Types
The administrator can back up to the local hard drive or an external device such as a DVD, CD or external hard drive. If the hard drive fails, having the backup on the hard drive means you lose your backup information as well. For this reason, best practices include copying files to an external media such as a DVD, which is then stored in a safe location.

3.Considerations
Best practices also include keeping data safe. The media used to store the backups require security, so hackers are unable to gain access to the files. Administrators should also centralize the backup location for users, so users are able to copy files to one directory. This one directory is backed up and restored by the administrator in case of an emergency.


Source : eHow

Wednesday, September 21, 2011

The Best Internet Security Systems


Norton AntiVirus 2010

Symantec leads the market for security software with Norton AntiVirus 2010. The $18.99 to $49.99 suite gets a four out of five-star rating from consumer review and news website CNET because of its robust features that guard users during all the major tasks of computing. Norton also taps its users as a resource to learn of emerging threats and provides diagnostics, which tell a user about his computer's speed and ways to optimize it. Norton AntiVirus works with Windows Vista and XP.

Kaperksy Anti-Virus 2010

Kaperksy Anti-Virus 2010 is also among the best Internet security systems available and gets a "very good" rating from software critics at CNET. It costs $21 to $31 and works on Windows 7, XP and Vista. Like Norton, Kapersky harnesses user data and behavior in its search for emerging threats. It's fully featured and can confront malicious software in emails, web pages and downloads, as well as phishing attempts. This software also includes identity theft protection.

Avast! 2009

Windows Vista, XP and 7, as well as Mac and Linux users, can get leading Internet security system Avast! Antivirus for free. It's among the top-rated antivirus products in the world, and it's developed by ALWIL Software in Prague, Czech Republic. Unlike other security programs, Avast! installs quickly, but, like others, it sends daily updates to your virus database. These updates contain information on the latest security risks and how to spot them. Avast! also offers "shields" of protection during peer-to-peer actions and instant messaging. Peer-to-peer sharing and instant messaging are popular avenues of viral attack.

Webroot Internet Security Essentials 2010

Webroot Internet Security Essentials 2010 is one of the best Internet security software offerings reviewed by InternetSecuritySuiteReview.com. It guards three of your PCs and gives you the option to copy your data to its remote servers. If something happens to your copy, Webroot has a backup. Webroot also provides gaming and movie modes that won't dog down your computer when gaming or streaming. The $59.95 program works on computers running Windows Vista or Windows XP.

Source : eHow.com

Tuesday, September 20, 2011

The 3 Best Tips for Computer Security


In this article, I will explain 3 ways to diminish the risk of viruses getting on a computer. Malicious software may come from a variety of source; not only from the Internet. A common type gets installed on the computer through a USB key. The owner of the device might not even know about it, as it is possible for a user to send a virus to his/her USB memory stick without knowing it. Actions can be taken to lower the risks.

The first step towards a secure computer is to install a firewall and an anti-virus. It is very important to have both because they each have different tasks. A firewall will watch the data that is transferred between a computer and the world wide web and will notify the user, or take action, if it detects something abnormal. It may also keep an eye on what is happening between the different applications and services of the computer. For example, if a program tries to access the registry, a crucial part of a Windows operating system, the firewall can detect it, block it and advise the user.

An Anti-virus has other tasks. It checks the computer for any data that might constitute or be the result of a virus, a spybot, a trojan, etc. Instead of only blocking the actions, they will detect the problem and, if possible, remove it. It is important to schedule periodic scans, without what the software might be useless. All this might seem costly, but there are some free alternatives that do a similar job, if not sometimes better, than paid ones. I have used and personally recommend the following: For the antivirus, Avast is one of the good free ones you'll find. For the firewall, I'd suggest Comodo personnal firewall.

The second most important step is to keep your system updated. Operating systems and web browsers often have protocols in place to prevent viruses and hackers to access the computer. Anti-viruses and firewalls also have lists of data they have to block and delete. Unfortunately, malicious software evolve everyday and new ones emerge, not waiting for the old ones to go away. Most of the time, it's possible to set up automatic updates. If it's not the case for the software you are using, be sure to do it manually every now and then. An out-of-date anti-virus is almost as useless as not having any.

The final step is to back-up your data. The softwares mentioned above are not perfect and a day might come when something you don't want finds its way to your system. Having a second copy of your data is also good in the case of a hard drive technical problem. If a lot of files are created and work is done on a computer on a daily basis, it can be useful to have an automatic backup plan that takes action everyday. That may be a lot of hassle, so I'd suggest doing a weekly back-up of your data. A lot of software do recursive back-ups, meaning that they only copy the files and folders that have been created since the last time. To find the right software for you, you can check on Wikipedia. It has a list of both free and paid options.

As soon as these are set in place on a new computer, the risks of a destructive loss are greatly reduced. A good way to help the situation is by surfing the web with carefulness. Ignore sites that tell you that your computer has problem and that you need to download there special anti-virus to get rid of it. Try to also avoid warez, keygen and all other illegal-software related websites.

Source : Ezine