Thursday, April 30, 2009

5 Simple Steps to PC Security

There are more than 200,000 programs out there that were made to infect the standard Windows PC. These programs can cause many problems- from a simple popup message to identity theft. In this article, I am going to give you some simple steps which will help you to keep your Windows PC operating smoothly. These simple steps can provide a layer of defense to these malicious attacks.

1. Keep informed about what infections are out there, and how they can infiltrate your system.

A computer virus is a computer program that can copy itself and infect a computer without your permission or knowledge. The term virus is also commonly used to refer to other types of malware, adware and spyware programs that do not have the reproductive ability. The primary difference between spyware and viruses is that a spyware program intends to embed, and a virus intends to spread.

Often times, these two equally dangerous but separate types of infections will work in together to exploit your PC. While the virus provides the way in, the spyware actually produces the un-desirable results. Viruses are sometimes confused with computer worms and Trojan horses which are technically different. A worm can spread to other computers without needing to be transferred as part of a host. While a Trojan horse is a program that appears to be harmless, but has a hidden agenda. Worms and trojans, like viruses, may cause harm to a computer’s hosted data, functional performance, or network throughput.

2. The first and most important layer of defense against these infections is a reliable anti-virus program.

Most modern anti-virus programs not only run scheduled scans to detect infections, but also provide real time monitoring of the system to prevent potential threats. You must keep the definition base up to date! As new infections emerge, anti-virus manufacturers release updates to their products that must be downloaded into the software to maintain their effectiveness.

3. A second layer of defense that is absolutely essential to maintaining the security of your PC is a firewall.

Newer operating systems such as Windows XP & Windows Vista have firewalls built into them. However, most experts agree that the Windows firewall is limited and provides little protection from real threats. The best type of firewall is a hardened firewall appliance. A firewall appliance is a physical device that stands between your computer and the internet to regulate what types of traffic are allowed into your local area network. By restricting what protocols can fo through the firewall, this will reduce the vulnerability of your systems to outside attacks.

4. When using a Microsoft Windows operating system, keep your system up to date.

Microsoft produces security patches and updates on a regular basis. These security patches are geared to prevent specific attacks which are intended to exploit their operating systems. Keeping your system up to date is just another way to keep these dangerous infections off of your computer. All current Windows operating systems also provide an Automatic Update feature which can download the security updates and patches for you on a regularly scheduled basis. It is a good idea to take full advantage of the feature by enabling Automatic Updates.

5. Cautious Internet usage, including a Corporate Internet Policy, is also effective to maintain the integrity of your PC.

Sites containing gambling, pornography, and social networking are often a haven for spyware & virus infections. Steer clear of these types of web content. If you are going to browse these sites, be sure that you know what you are installing, if prompted. This method of infection is commonly referred to as phishing, where a web site gets you to click on a link or object which covertly executes code in the background.

Peer-to-Peer applications are also known to be full of viruses. Peer-to-Peer applications allow computers connected to the internet to connect directly to each other for the purpose of file sharing. Common Peer-to-Peer applications include: LimeWire, BitTorrent, Morpheus, Kazaa, BearShare, Ares, and eMule. These programs are ill-advised for any business network or environment, and should only be used by a well-educated and cautious user.


These tips were brought to you by Computer Works' IT consultant Matt Towers