SAFEGUARD YOUR COMPUTER

SAFEGUARD YOUR COMPUTER

Wish to remind you all of our online computer security training that commenced on15th September, 2018 in this social network platform. So be alert for the training .

Just as the home is protected against intruder or damage so also do your computers need protection. Have you ever asked why people build homes and have doors, windows, gates, and guards like animals, man and robot in it? So our computers need to be protected for the following reasons:

1.      Thieves or hackers: These people can cripple you after accessing your data.

2.      Accidents: This situation can happen by spillage water unknowingly into your computer

3.      Natural disaster: Uncontrollable situation like flood, droughts, snows etc can render your computers function-less

4.      Electrical supply: Sparks from electricity supply can damage the computer

After a careful thought, i have decided to reveal some of the solution to the threat of computer. Some of the solution are listed below:

  1. Check the privacy policy of any online shopping website to confirm if they are security conscious because there are some online shopping sites or E-commerce site that market information about people to personal information database companies
  2. Install personal firewall program that alerts one about attempts to connect to ones computer. personal firewall program are software that prevent unauthorized access to ones computer
  3. Install antivirus and update it regularly (NB do not leave the default configuration setting after installing firewall program or antivirus software)
  4. Be careful of what you download online especially free download
  5. Configure your browser history to a define period. Because this will enable you to track the sites you visited against eventuality
  6. Stop services that you are not using to run in your computer. For example, internet information services (ISS) because hackers it to launch attack.
  7. Update security patches. Security patches are bits of code that close vulnerable opening in system software.
  8. Test to prevent trouble by downloading Ad-aware, a software that detect unwanted programs that one might download unknowingly. you can do a free test of your computer defense at https://www.hackerwhacker.com
  9. Check for secure server. Whenever you are making online transaction check for secure server icon that appears as padlock at the browser window.
  10. Turn off your computer while you are not using it because you do not only conserve power or save other components functionality but you prevent hackers from breaking into your computer
  11. Configure your browser to reject cookies
  12. Ensure you download from manufacturers websites or from the original Author.
  13. Avoid using pirated software
  14. Use good passwords: with characters like numbers, alphabets and symbols. Again do remember to use strong password like mentioned above because it will be difficult to be hacked.Eg chi24569*&-
  15. Check the use of grammar: intruders normally commit blunder in their use of grammar while communicating to people. By being conscious of this act you will escape from being their victim
  16. Confirm your E-transaction, if you are being paid through mobile phone or computer, ensure you wait for debit alert after some time or possibly you can confirm from your bank account officer. Again you can use Escrow service while making online purchase to protect you. Because these Escrow service like PayPal and others can protect both parties, that is the buyer and the seller against eventuality.
  17. Ensure you format your phone or computer on first use if it is not on default from the manufacturer. Because there could be application installed in it that gather information about the user.
  18. Do discourage the use of other storage device from unknown persons . Because external storage media like flash drives, memory cards, card reader and etc could be use to extract vital data from your computer.
  19. Avoid the use of company's or organization's computers or phone for personal need
  20. Avoid opening message from unsolicited email
  21. Use IP Address network detector or tracker
  22. Be mindful of call masking, ATM masking and email masking
  23. Sign out account: Whenever you are surfing any online account ensure you sign out immediately after usage.
  24. Report to the appropriate country's online investigation agency when in doubt of any online transaction. Eg. https://www.consumer.gov.uk for United Kingdom, https://www.naago.org for USA or https://www.efccnigeria.org for Nigeria. etc
  25. Protect Children while online
  26. Review the seller company's legal terms to be sure of warranty after purchase.
  27. Backup your data periodically
  28. Train your ICT employees regularly
  29. Monitor the behaviour of every ICT user. However, there are registered professional bodies in every country whose duties are to perform the regular check
  30. There should be need for use of Bio-metrics security system
  31. Mark your computer: Making your computer with a precision tool will help to easily recover your computer from the police when being stolen. Although, this do not give an absolute protection but it will help you a lot.
  32. Document your computer purchase detail: Keep the receipt, invoice and other related information of your computer save so that you can easily provide in case of eventuality.
  33. Government should inert Laws and policies that will encourage computer security
  34. Use fire extinguisher: Ensure you have fire extinguisher in your office and home where your computers are kept because this will help in case of fire outbreak.
  35. Do have employees and visitors register: Having a separate register for employees and visitors will checkmate a lot of activities in the office
  36. Seek for the service of security guards
  37. Install an alarm system in the office
  38. Turn off electricity supply switch
  39. Prepare for eventuality
  40. Protect your Email
  41. Beware of fraudulent telemarketing calls
  42. Be calm when Data is missing
  43. Send your data to the cloud
  44. Use lightening protection system
  45. Seek for a professional support
  46. Protect Sensitive Electronics with Dry Bags
  47. Use uninterruptible power supply (UPS)
  48. Install a badge security system
  49. Attach mobile proximity alarms to your office computers
  50. Maintain good safety rule
  51. Insure your computers
  52. Provide adequate light glowing bulbs
  53. Regularly check your bank statements
  54. Watch out for card skimming
  55. Ensure no takes photograph of your credit card
  56. Educate the public by using indigenous language to campaign against cyber crime
  57. Religious leaders and parents should install the fear of God to people by making them to be at peace with their supreme being. God is the universal being that we all look unto. therefore, obeying his commandment to love our neighbours as ourselves is important in our daily living. When we love our neighbours as ourselves, we do not cheat or hurt them bearing in mind that God will surely punish us for whatever ill life we live in this world

CAUSES OF COMPUTER SECURITY

  1. Over trust
  2. High quest for material need(Greed)
  3. Poor salary earning
  4. Poverty
  5. Unemployment
  6. Recession
  7. Inflation
  8. Natural disaster
  9. Poor parental care
  10. Frustration
  11. Improper behaviour of some religious clerics
  12. Quest for money/financial gain
  13. Recognition/fame
  14. Vengeance
  15. Job dissatisfaction
  16. Display of ill gotten wealth
  17. Sabotage
  18. Peer pressure group
  19. weak law

Consequences of computer security

  1. Tarnishes the reputation of a country
  2. Loss of job opportunity
  3. Loss of investment opportunity
  4. Loss of life and properties
  5. Loss of revenues
  6. Encourages terrorism

Types of computer security

  • Physical security
  • Network security
  • Software security

Identifying cyber fraudsters

  • They ask for your password
  • They are imposters: The pretend to be whom they are not. Either disguising as Government official, family member, charity outfit or business partners by sending texts, phones calls and email
  • They fake caller id
  • They must have defrauded their victims
  • They ask for payment in advance
  • They ask their victim to use the following mode of payment as western union, moneyGram, moneypat, reloadit or gift cards
  • They are in a hurry to make you take decisions
  • They use robot call
  • They offer free trial items
  • They use ATM card trapper
  • They use jackpotting techniques which install malwares into ATM in order to dispense cash at their demand. Although, this techniques is predominant in western countries US, Europe and UK
  • They either dress as tout or smart but very dangerous
  • They ask you for their assistance at ATM post
  • They take record and photographs of your activities while at ATM post using their phones or other devices
  • They search for the receipt of your ATM transaction at ATM post because they are wary that you must throw them away
  • They search for situation where there are changes in audit and legal counsel
  • They operate more where organization are understaffed
  • They operate more where organization place higher target on staff
  • They operate more where organization product and services are less in quantity

Victims of computer security

According to annual report of Norton by Symantec, an international computer security company that 18 people fall Victims of computer security every second, "resulting in more than 1.5M computer security victims each day".

Further discussion: Victims of computer security and many more

You can reach me on Tel: +2348026152943 or via email at [email protected]

要查看或添加评论,请登录

Afam Ebede的更多文章

  • Why some people are unemployed?

    Why some people are unemployed?

    1. Technology 2.

    11 条评论
  • A GOODBYE TO UNEMPLOYMENT

    A GOODBYE TO UNEMPLOYMENT

    To all friends of mine, I would advise that you remain focus, pursue your dream and never give up no matter the…

    5 条评论
  • -Difficulty situation to compromise faith-

    -Difficulty situation to compromise faith-

    What do you do if you are so broke that you cannot pay rent, school fees, utility bills and beaten by hunger?. Suddenly…

  • Independent celebration

    Independent celebration

    In celebration of our independent day being 12th June, 2021, we are offering a discount on our used computers(Laptops…

  • EFFECTS OF CYBERCRIME INCREASE GLOBALLY

    EFFECTS OF CYBERCRIME INCREASE GLOBALLY

    According to UK’s National Cyber Security Centre (NCSC) and US Department of Homeland Security (DHS) Cybersecurity and…

  • A N Y T H I N G*

    A N Y T H I N G*

    A N Y T H I N G* *ANYTHING THAT ANNOYS YOU* is teaching you patience and calmness. *Anyone that abandons you* is…

  • RFID SKIMMING YOUR CARD

    RFID SKIMMING YOUR CARD

    Read this and be at alert because fraudsters are every where in the world. They have deplored a recent technique to…

  • BATTLING COVID 19 VERSES UNEMPLOYMENT

    BATTLING COVID 19 VERSES UNEMPLOYMENT

    What is Covid-19? It is the disease caused by a novel corona-virus which originated from wuhan china. The names is from…

    1 条评论
  • Reducing cybercrime threat in financial institutions -Lesson 2-3

    Reducing cybercrime threat in financial institutions -Lesson 2-3

    Financial institutions are uniquely challenged as they are often a target for hackers. My customers rightly worry about…

  • MOBILE DEVICE APP SECURITY

    MOBILE DEVICE APP SECURITY

    What is mobile application security? Mobile app security is the protection of mobile device apps from digital fraud…

社区洞察

其他会员也浏览了