This will Spare your PCs
from Viruses
In addition
to technical vulnerabilities, the employee is often the easiest way for an
attacker to access company data. The reason: uncertainty, ignorance or convenience
in everyday work.
But this
disadvantage can become an opportunity for you. You can significantly
reduce the risk of attacks on your business with regular employee
training. We recommend our training courses: Computer Security for
Employees and Data Protection for Employees.
Don't worry;
your employees don't have to be computer specialists. We will teach you
the basic rules that you must use to make your company much safer.
1. Regular updates
First of all, you should keep your computer's software as up-to-date as possible and regular updates will help you. It is recommended to activate the automatic software update function. Updates help eliminate potential security holes. Be aware of regular updates to your browsers and email programs.
2. Protect your computer with Antivirus Software
We recommend an updated antivirus program to help protect your computer from viruses and Trojans. Programs of this type scan your computer, manually or automatically, and report any problems that occur. There are three different types of analysis: real-time analysis, manual analysis, and online analysis:
·
Real-time
Antivirus scanner: Runs in the background as a system service and
controls all files, applications and services. If virus protection has
found something suspicious, the user is usually asked first what the next
procedure should look like, so that the user has the power of decision.
·
Online
Free Antivirus scanners: Online scanners check files or the entire computer
over the Internet. This works without installation and usually without
registration. However, the software does not protect the computer from new
infections, it only detects existing threats during analysis.
·
Manual
scanners: The
special feature is the manual scanner setup. The user must initiate each
scan by him. If a dangerous program is found, the program displays
possible solutions to neutralize it.
It
must be determined in advance that the antivirus scanner is running permanently
so that malicious programs can be detected at an early stage. So-called
full scans are also recommended, which completely scan the computer.
Antivirus Software should be a must for everyone, as
this dramatically increases the overall security of the computer.
3.
Beware
of unknown data sources!
Unknown data sources include, for example, USB sticks or external hard
drives. These appear to be safe at first glance, but may contain malware
or virus-contaminated files. Connecting a USB device may be enough to
infect the computer without any signs.
Tip: Do not connect any foreign device to your computer, since you never
know what may be in it. You should also not lend your devices to
strangers, as a virus transmission is possible.
4.
Caution
with unknown files on the Internet
As the most important means of communication, email poses a particularly high
risk of phishing: therefore, you should check email messages with files
attachments in particular, as the malware could hide there.
You must not open email attachments from unknown senders. You can use an antivirus program to check email attachments so that you are safe. Additionally, you can opt for various types of email encryption to prevent potential virus attacks by malware. To be effectively protected, email messages must encrypt stored correspondence records and the connection to your email provider.
5.
Be
careful when installing new software
It is very likely that everyone who surfs the Internet has already installed
some software. In this case too, it must be checked beforehand whether and
to what extent the source is reputable. Because when you download software
onto your computer, malware can be an unwanted guest.
6.
Regular
Backups
Despite all security precautions, your computer may have been infected with
Trojans or other malicious programs. As a result, the data is no longer
accessible in the worst case.
In short: Everything is erased or can no longer be recovered. Therefore,
we recommend regular backups to external storage media so that photos, videos,
and documents can be stored independently of the computer.
7.
Browser
Security: Use updates!
Outdated browsers are the number one target for malicious hacker
attacks. You can also use different browsers for different
services. This has the advantage that all plug-ins, extensions and cookies
can be disabled in a browser, as they are particularly vulnerable.
As a result, you will no longer be able to bank or shop online there, but you
will be more secure on supposedly unsafe websites.
In addition, you should regularly delete your tracks on the Internet, such as the cache. This makes them more difficult for cyber attackers to detect.
8. Drive-by download: Open your eyes!
Hacker attacks are becoming more frequent and imaginative. An example of
this is downloads from the hard drive. However, the attackers' approach is
quite simple:
An Internet user visits a website that has previously been edited by
hackers. Now this manipulation of the website triggers a download. In
some cases this is not even noticed by the user, because there is no additional
demand if the download has to be started. Once the malicious program is on
the PC, the real effect can unfold and thus damage the user's device.
Now the question arises how to optimally protect against such
attacks. Here we also recommend an updated antivirus
program. Otherwise, you should be on the lookout for suspicious websites
or questionable downloads, as malware is very difficult to detect.
9. Use strong passwords
At this point, users and companies should be careful to use strong and, above all, complex passwords. For example, password managers can be used to store passwords securely and to generate new passwords made up of different letters, numbers, and special characters.
10. Data protection and IT security can
ensure a more resilient company.
Educate yourself and your employees with our IT Security for
Employees and Data Protection for Employees training courses.
No comments:
Post a Comment