12 Scams of Christmas - Computer Advisory Services - for all your IT Needs

Search
Go to content

Main menu:

How to prevent your PC from becoming a Zombie

Published by in General · 10/10/2012 15:03:23

You may know the basic facts on botnets, networks of compromised machines commandeered by hackers. But, are you aware of how to keep your own PC from being affected? Here's a look at specific steps you can take to help ensure that your computer does not end up under the control of cyber criminals.

Use anti-virus and anti-spyware software and keep your software updated.

Use a firewall and make sure it's properly configured.

A firewall provides critical protection to keep your PC safe from unauthorized access. To complement your anti-virus or anti-spyware software, use a user-friendly firewall, like Panda Firewall
, to monitor and block suspicious traffic that could be a sign of bot compromise.

Run regular security updates for your operating system, web browsers, and other applications.

Keep all of your applications up-to-date with the latest security patches. It's critical that you run Microsoft Update (update.microsoft.com) to install all of the current Windows patches. You can do this easily by setting your PC to receive automatic security updates.

Run different scanners to check for infections, including rootkit revealers. But, always make sure you're using reliable, respected security software.

Many computer users like to run a variety of different scanners to help find infections. Keep in mind - you also need to use caution when it comes to the security software you use. Rogue security software is on the rise, attempting to play off of computer user's fears about malware infections to peddle their fraudulent software. Be cautious and ensure the software is legitimate before downloading any programs.

Practice safe online behavior - click with care!

Be vigilant and use common sense when browsing the Web. You should be especially cautious when checking your e-mail or messages on social networking sites; don't open attachments or click links from unknown senders or in unsolicited messages.




Steps to Protect your Technology Products

Published by in General · 9/10/2012 08:57:30
We urge all users of laptops and smartphones to take extra precautions as instances of theft are on the rise. The risk of loss associated with identity theft is just too great, and technology users must be extra careful

Backup Tips

Published by in General · 2/10/2012 20:12:09
A comprehensive data backup strategy is vital to your data security. Too many people wait until disaster strikes before they think about a backup. A good backup is an excellent way to protect against viruses, deteriorating hard drives, disasters and human errors. If it would not be cost effective or even possible to re-enter data, then you need a backup strategy.

What is Rogue Security Software?

Published by in Rogue Software · 28/9/2012 19:53:52
Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts to lure users into participating in fraudulent transactions. Some products defined as "rogue" simply fail to provide the reliable protection that a consumer paid for. Others are far more sinister, masquerading as legitimate security software, and using deceptive tactics to con users into buying the product.

Security Software Basics

Published by in General · 24/9/2012 19:23:49
Today's threats are varied, sophisticated, and continue to adapt in order to get past your defenses. And that means that going online without essential protection in place on your computer is no longer an option.
Newer posts | Older posts
Back to content | Back to main menu