Computers have been a
staple of almost everyone's lives in this generation. Almost everyone has some
sort of purpose for a computer to do their work for them. That is why it is
essential to protect it from threats. Especially people who run businesses who
contain classified info that cannot be leaked. Whether you are an official in a
business or a simple person, this guide can help you protect your computer and
keep your sensitive and private information all to yourself.
A. Devise a
Precautionary Measure When an Attack Occurs
Always be prepared if an
event occurs. Inform users of your network on what they will do in order to
prevent further damage. Remember that cyber-attacks are sneaky and very
difficult to identify unlike physical attacks where you can call 911 and escape
before anything bad happens. But in the case of cyber-attacks, you can't just
call 911. You have to have a plan that is effective and systematic. Try
installing antivirus to lessen harm and protect your system. Try to use Cloud
virus protection tool to protect your system from harmful virus, malware or any
kind of malicious plugging. It can protect multiple systems and has a longer
list of threats it can protect you from.
B. Always Have
Extra Copies of Your Data
If something occurs and
your data has been corrupted, your files cannot be recovered and are forever
diminished. It is always a good idea to have a back-up for everything. Keep
small data in floppy disks and larger data in CDs or in USBs. It is nearly impossible
and costly to have an entire copy of your company's data so try to select and
copy the most sensitive and most vital information that you need.
C. Inform Your
Users of Passwords and Change them Constantly
Check your system and
apply appropriate precautionary measures. If you are a private network user
then remember to change passwords ever at least 2 months for better security.
If you have a small business then keep your employees' schedule monitored both
online the net and present in work. If you own a company then it is advised to
install security software for virus protections that only allow authenticated
people to access your company's networks.
D. Devise a way to
report hindrances related to work
It is advised to install
security software's that monitor the user who is currently operating the
computer so that you may know who is responsible if a problem may occur in that
unit. It is important to know the cause of trouble so that it may be treated at
once and avoid further damage. You can also use cloud antivirus protection for
your system security.
E. Call an
emergency and inform everyone during an attack
The more users of the
system, the more damage can be done. Viruses and other threats love linked
networks so that it can get more victims. During an attack, limit everything
that has to do with your system. Try executing a temporary shutdown to some
users and run less applications and software to prevent the cyber attack from
being catastrophic.
F. Inform every
user of what to do in case of an attack
Your users must know
what to do if an attack occurs. Remember to tell them to never panic and do
some of the tips listed here. Tell them to report attacks to higher authority.
Try conducting an attack drill to practice them of what to do. This can spot
weaknesses and vulnerable point that can be improved and strengthened.
G. Inform Operators
and Experts of the Attack
Don't let your ego get
to you. Some people believe that attacks can affect their organization's
reputation. This is indeed true but that's life. You never know when an attack
can happen. If your department got attacked, don't be afraid to be scolded by
your boss for screwing-up and having poor computer security. Instead, tell them
honestly so that they may know what to improve and can advise you of what you
can do.
H. Report
Cyber-Attacks to Public Officials
If there are theories or
suspicions that the attack that you have experienced is an act of terrorism,
report it at once. The authorities can then send word to government agencies to
track these hackers and prevent further attacks. Report it to the United States
Computer Emergency Readiness Team (US-CERT). You can call in your reports at
1-888-282-0870 or through their Internet IncidentReporting System.
Do you have more
cyber-fighting ideas? Don't forget to comment below, and share with us your
thoughts.
Author is a computer
professional and blog writer who basically writes on various computer security
topics. He informs readers about the latest antivirus programs in order to get
better computer security and safety from malwares.
Article Source: http://EzineArticles.com/?expert=Alexs_Smith
Article Source: http://EzineArticles.com/7991029
No comments:
Post a Comment