Protecting your Home Computer

Computers are a commodity used for nearly every facet of our life. You may use them for highly-sensitive tasks like completing your taxes, monitoring you credit report, and transferring balances between your bank accounts--all in-addition to regular web surfing, email, games, instant messaging and a host of other activities. We typically depend on our computers and the data we store. However, it is easy to become complacent towards electronic risks.

While most intruders (also called hackers, attackers, or crackers) out there likely do not care about one individual's computers, the Internet is still a dangerous place for your computer and the data you store on it. Many intruders actually want to control your computer to use it for attacks on other systems or to send spam. By controlling your computer, they are able to hide their true identity as they attack other targets. Other intruders may be looking to quickly gather social security numbers or credit card numbers for identity theft.

Other attacks use social engineering tactics. Some websites or emails are trying to trick you into giving up your information (like your social security number, bank account number, credit card number, usernames, passwords, etc.) on your own. They will then use this information to steal money out of your bank account or use your credit worthiness to their advantage.

Luckily, there are plenty of easy things you can do to protect your home computer and yourself in the process.

Support Articles

Despite your best efforts, something bad can happen to your computer.  Hardware or software failures in addition to security threats can make your data disappear.  The best protection...
August 20, 2013
Before selling or discarding an old computer, or throwing away a disk or CD, you naturally make sure that you've copied all of the files you need. You've probably also attempted to delete your...
August 20, 2013
Keeping your software up-to-date is an important part of securing your home computer.  Vendors release patches or updates regularly to fix security holes that are found in their software....
August 12, 2010
Unfortunately, a large number of websites online are fraudulent, attempting to get your personal information or credentials in some manner.  There are a few simple things you can do before...
August 20, 2013
How do you know if your identity has been stolen?Companies have different policies for notifying customers when they discover that someone has accessed a customer database. However, you should be...
August 5, 2010
Children present unique security risks when they use a computer--not only do you have to keep them safe, you have to protect the data on your computer. By taking some simple steps, you can...
August 20, 2013
How much personal or highly confidential information is on your laptop?  What would happen if somebody stole your laptop?  Would they have more than just a machine, but the ability to...
August 17, 2010
Anytime anyone asks for your personal information, you should first ask yourself if the information should really be disclosed.  Does the place you get your haircut really need to know your...
August 5, 2010
When anyone or anything can access your computer at any time, your computer is more susceptible to being attacked. You can restrict outside access to your computer and the information on it with a...
January 30, 2012
Anti-virus and anti-spyware software, more easily defined as anti-malware software, are probably the most important pieces of software any Windows system can have.  While Macs, Linux, and...
January 30, 2012
Passwords/passphrases are a common form of authentication and are often the only barrier between a user and your personal information. There are several programs attackers can use to help guess or...
March 25, 2014
Syndicate content