SAFEGUARD YOUR COMPUTER
Afam Ebede
Senior DB Specialist ? Enhanced Data Security ? Trainer ? Cyber Security Consultant ? Curriculum Development ? Motivational Speaker ? Author ? Trainer ? Career Developer ? Website Designer
Wish to remind you all of our online computer security training that commenced on15th September, 2018 in this social network platform. So be alert for the training .
Just as the home is protected against intruder or damage so also do your computers need protection. Have you ever asked why people build homes and have doors, windows, gates, and guards like animals, man and robot in it? So our computers need to be protected for the following reasons:
1. Thieves or hackers: These people can cripple you after accessing your data.
2. Accidents: This situation can happen by spillage water unknowingly into your computer
3. Natural disaster: Uncontrollable situation like flood, droughts, snows etc can render your computers function-less
4. Electrical supply: Sparks from electricity supply can damage the computer
After a careful thought, i have decided to reveal some of the solution to the threat of computer. Some of the solution are listed below:
- Check the privacy policy of any online shopping website to confirm if they are security conscious because there are some online shopping sites or E-commerce site that market information about people to personal information database companies
- Install personal firewall program that alerts one about attempts to connect to ones computer. personal firewall program are software that prevent unauthorized access to ones computer
- Install antivirus and update it regularly (NB do not leave the default configuration setting after installing firewall program or antivirus software)
- Be careful of what you download online especially free download
- Configure your browser history to a define period. Because this will enable you to track the sites you visited against eventuality
- Stop services that you are not using to run in your computer. For example, internet information services (ISS) because hackers it to launch attack.
- Update security patches. Security patches are bits of code that close vulnerable opening in system software.
- Test to prevent trouble by downloading Ad-aware, a software that detect unwanted programs that one might download unknowingly. you can do a free test of your computer defense at https://www.hackerwhacker.com
- Check for secure server. Whenever you are making online transaction check for secure server icon that appears as padlock at the browser window.
- Turn off your computer while you are not using it because you do not only conserve power or save other components functionality but you prevent hackers from breaking into your computer
- Configure your browser to reject cookies
- Ensure you download from manufacturers websites or from the original Author.
- Avoid using pirated software
- Use good passwords: with characters like numbers, alphabets and symbols. Again do remember to use strong password like mentioned above because it will be difficult to be hacked.Eg chi24569*&-
- Check the use of grammar: intruders normally commit blunder in their use of grammar while communicating to people. By being conscious of this act you will escape from being their victim
- Confirm your E-transaction, if you are being paid through mobile phone or computer, ensure you wait for debit alert after some time or possibly you can confirm from your bank account officer. Again you can use Escrow service while making online purchase to protect you. Because these Escrow service like PayPal and others can protect both parties, that is the buyer and the seller against eventuality.
- Ensure you format your phone or computer on first use if it is not on default from the manufacturer. Because there could be application installed in it that gather information about the user.
- Do discourage the use of other storage device from unknown persons . Because external storage media like flash drives, memory cards, card reader and etc could be use to extract vital data from your computer.
- Avoid the use of company's or organization's computers or phone for personal need
- Avoid opening message from unsolicited email
- Use IP Address network detector or tracker
- Be mindful of call masking, ATM masking and email masking
- Sign out account: Whenever you are surfing any online account ensure you sign out immediately after usage.
- Report to the appropriate country's online investigation agency when in doubt of any online transaction. Eg. https://www.consumer.gov.uk for United Kingdom, https://www.naago.org for USA or https://www.efccnigeria.org for Nigeria. etc
- Protect Children while online
- Review the seller company's legal terms to be sure of warranty after purchase.
- Backup your data periodically
- Train your ICT employees regularly
- Monitor the behaviour of every ICT user. However, there are registered professional bodies in every country whose duties are to perform the regular check
- There should be need for use of Bio-metrics security system
- Mark your computer: Making your computer with a precision tool will help to easily recover your computer from the police when being stolen. Although, this do not give an absolute protection but it will help you a lot.
- Document your computer purchase detail: Keep the receipt, invoice and other related information of your computer save so that you can easily provide in case of eventuality.
- Government should inert Laws and policies that will encourage computer security
- Use fire extinguisher: Ensure you have fire extinguisher in your office and home where your computers are kept because this will help in case of fire outbreak.
- Do have employees and visitors register: Having a separate register for employees and visitors will checkmate a lot of activities in the office
- Seek for the service of security guards
- Install an alarm system in the office
- Turn off electricity supply switch
- Prepare for eventuality
- Protect your Email
- Beware of fraudulent telemarketing calls
- Be calm when Data is missing
- Send your data to the cloud
- Use lightening protection system
- Seek for a professional support
- Protect Sensitive Electronics with Dry Bags
- Use uninterruptible power supply (UPS)
- Install a badge security system
- Attach mobile proximity alarms to your office computers
- Maintain good safety rule
- Insure your computers
- Provide adequate light glowing bulbs
- Regularly check your bank statements
- Watch out for card skimming
- Ensure no takes photograph of your credit card
- Educate the public by using indigenous language to campaign against cyber crime
- Religious leaders and parents should install the fear of God to people by making them to be at peace with their supreme being. God is the universal being that we all look unto. therefore, obeying his commandment to love our neighbours as ourselves is important in our daily living. When we love our neighbours as ourselves, we do not cheat or hurt them bearing in mind that God will surely punish us for whatever ill life we live in this world
CAUSES OF COMPUTER SECURITY
- Over trust
- High quest for material need(Greed)
- Poor salary earning
- Poverty
- Unemployment
- Recession
- Inflation
- Natural disaster
- Poor parental care
- Frustration
- Improper behaviour of some religious clerics
- Quest for money/financial gain
- Recognition/fame
- Vengeance
- Job dissatisfaction
- Display of ill gotten wealth
- Sabotage
- Peer pressure group
- weak law
Consequences of computer security
- Tarnishes the reputation of a country
- Loss of job opportunity
- Loss of investment opportunity
- Loss of life and properties
- Loss of revenues
- Encourages terrorism
Types of computer security
- Physical security
- Network security
- Software security
Identifying cyber fraudsters
- They ask for your password
- They are imposters: The pretend to be whom they are not. Either disguising as Government official, family member, charity outfit or business partners by sending texts, phones calls and email
- They fake caller id
- They must have defrauded their victims
- They ask for payment in advance
- They ask their victim to use the following mode of payment as western union, moneyGram, moneypat, reloadit or gift cards
- They are in a hurry to make you take decisions
- They use robot call
- They offer free trial items
- They use ATM card trapper
- They use jackpotting techniques which install malwares into ATM in order to dispense cash at their demand. Although, this techniques is predominant in western countries US, Europe and UK
- They either dress as tout or smart but very dangerous
- They ask you for their assistance at ATM post
- They take record and photographs of your activities while at ATM post using their phones or other devices
- They search for the receipt of your ATM transaction at ATM post because they are wary that you must throw them away
- They search for situation where there are changes in audit and legal counsel
- They operate more where organization are understaffed
- They operate more where organization place higher target on staff
- They operate more where organization product and services are less in quantity
Victims of computer security
According to annual report of Norton by Symantec, an international computer security company that 18 people fall Victims of computer security every second, "resulting in more than 1.5M computer security victims each day".
Further discussion: Victims of computer security and many more
You can reach me on Tel: +2348026152943 or via email at [email protected]