Skip to main content

4 Tips to Stay Secure in 2017

As the technology grows, so does the potential of compromising sensitive information. You need to take precautions to avoid hackers harming you or your system. Hackers are keeping up with the pace of security programs to gain access to your information. We have compiled a list of steps which when followed make you secure on the internet. Let’s take a look at them:

Always use a Firewall:

A firewall is a software program or network protection device that controls the incoming and outgoing network traffic to screen out hackers. Firewall program works by monitoring and blocking system calls that don't meet the predefined security rules. Always use a firewall to stay protected against threats. Firewall protects against unauthorized access of your pc, makes interaction through internet safer and blocks unnecessary messages that anyone might send.

Stay away from spam websites:

It is difficult to spot out a website that is spam from a website that is not. Often these kinds of websites use a miss-spelled domain to gain the trust of the visitor. To avoid miss-spelling, search for the website name on Google and then click on the URL to go to the website. That way if you miss-spelled the name Google will most probably identify and tell you about the mistake. For websites that ask you about sensitive information - such as eCommerce based websites – check if the URL has https on it instead of http. This prevents a hacker that is monitoring your network traffic to gain access to your sensitive information.

Don’t read spam emails:

Many spam emails have malicious program attached with them. Normally email servers block these emails but still you need to be careful.  You should not open emails that are marked as spam by your email client. Even if you need to read it because for instance, you thing that the email is marked spam wrongly then you should not click on any of the links present in the email. Also you need to be careful against emails that are from those with whom you regularly communicate.

Install Antivirus Software:

Whether you stay away from spam, don’t click on potentially malicious links or don’t open spam emails or not, you should have an Antivirus installed on your system.  It protects your system from hackers installing worms or Trojans exploiting vulnerabilities of software such as browsers that you use. Only installing antivirus is one part of being safe from malicious software. You need to regularly update your antivirus so that it gets definition file for all the latest viruses.

We have given four steps that would help you stay safe while online and protect yourself from compromising your PC or your sensitive data. By following these simple rules you would avoid hackers hacking into your system.


Popular posts from this blog

Simplified DES Example: Step by Step

Simplified DES or S-DES is an encryption algorithm which follows feistal cipher structure. In this tutorial, we will take an example of S-DES. Let’s get started.
We need plaintext and key to start with. For this example, let’s consider 01001000 be the 8-bit plaintext and 1110001110 be the 10-bit key.
Key Generation: The first step in S-DES process is key generation. From the 10-bit key that we give as input, it generates 2 1-bit keys called k1 and k2. Following is the process:
1.Pass the 10-bit input key into the P10 table:
3 5 2 7 4 10 1 9 8 6
This gives: 1011001110. (For example, take the 3rd bit from input key which is 1. It becomes the first bit for our new key) 2.Divide the new key into two halves and left shift each half’s bits by one. So by dividing we get 10110 and 01110. We perform left shift so the left most bit becomes the right most bit and remaining each bit is shifted to its left. This gives: 01101 and 11100. Or you can think of it as the left most bit is taken to the righ…

HCI: Research Topic Ideas

I was reading an interesting research paper (Personal Tasks at Work: An Exploration, ACM 2017) in which the writer talks about the personal tasks that we have to do at work such as scheduling appointments, paying electricity and other bills, etc. The problem at first seems to be a social science one which has nothing to do with computer science but when looked closely the problem highlights an important aspect of our daily life that has to be sorted out using technology. The paper basically discusses those tasks and categorizes them based on frequency of occurring based on a survey. So, for example out of the 93 people who participated in the survey presented in the paper, 51% reported a need for scheduling an appointment while 33% have to coordinate their personal activities. Some will say (specially management science guys) that few of the problems can be solved by proper time management but remember that the purpose of technology is to make life easier for humans. Also, not every …

Cyber Security Awareness: for Employees

The insecurity of data and information that exists on the internet and computer networks has been a major issue for a number of businesses, organizations, and institutions; which don't invest on network and internet security training and awareness programs for their employees. Ideally, most employers rush to invest in new and expensive technologies in the name of protecting their companies online, not knowing that in most cases, the safety of a company online largely depends on the cyber security awareness of the employees. Consequently, your company's protection online starts by ensuring that your employees are well equipped with basic network safety practices and policies, so that they can assist in keeping your computers and networks safe from cyber-attacks that come in form of a virus, malware, and cyber-crime.

Different Ways to Create Cyber Security Awareness to Your Employees:
The most basic network security measure that your employees need to use is a pass…