Quantcast
Channel: Symantec Connect - ブログエントリ
Viewing all articles
Browse latest Browse all 5094

Tips to "Be SAFE"

$
0
0
Be Safe.

If you connect to the Internet, allow other people to use your computer, or share files with others, you should take steps to protect your computer from harm. Why? Because there are computer criminals (sometimes called hackers) who attack other people's computers. These people can attack directly, by breaking into your computer through the Internet and stealing your personal information, or indirectly, by creating malicious software to harm your computer.

Fortunately, you can help protect yourself by taking a few simple precautions. This article describes the threats and what you can do to defend against them.

Be Safe: Antivirus Software

Many of the more common viruses morph or change frequently to make them more difficult to detect. Viruses spread rapidly and by many different ways (for example, via email attachments; infected document files; Web sites that contain hostile code that can infect your computer through vulnerable browsers; and unprotected fileshares). Your computer may be vulnerable to virus attacks if you are not using antivirus software and updating it regularly. Using Symantec AntiVirus and configuring it to update virus definitions automatically will help keep your computer protected. Download Symantec AntiVirus and be sure to set it up for automatic updates.

Symantec-Endpoint-Protection-Changes-Registry-Key-Location-2_2.png

Important: New computers often come with trial versions of antivirus software. Having two different antivirus programs installed on one computer can cause conflicts. Always uninstall the antivirus software that came on your computer before installing the Symantec software.

Be Safe: Back Up

Most people know that they should back up their files, but don't do it, because they don't know how, figure it takes too much time, or think it might cost too much. However, there are many methods for backing up your files at a low cost. Don't wait until you lose hours or even years of work in a single moment. Take a few moments right now to identify a method that will work for you.

Here are some methods you can use:

  • Portable Hard Drives

An external hard disk is a fast, efficient way of backing up all of your data. Models are available that either plug into your computer’s USB port, or connect via your wireless network. Most are so compact that they can easily be stored off-site.

These typically range from 320 Gigabyte (320,000 Megabyte) models costing less than £50, to those providing up to 4 Terabytes (4,000 Gigabytes) for around £275. To give you an idea of the amount of storage they provide, one photo of reasonable quality taken on a digital camera or camera phone will typically be between 1 and 5 Megabytes. A music file in MP3 format will be between 3 and 8 Megabytes. So even on the 320 Gigabyte drive mentioned above, you could fit over 100,000 average-sized photos or 64,000 music tracks. 

Some portable hard drives provide a ‘one touch’ feature which backs up your data at the touch of a button, or automatically at pre-set intervals. 

It is important to test that the data you have backed up on your portable hard drive can be recovered if needed. You should test this by using a different computer to ensure that the backup is compatible – and recoverable – in the event of the loss of your existing computer. 

online-file-backup.png

  • Online Backup (Cloud Backup)

The use of online backup (also known as ‘cloud backup’) is increasingly popular owing to its added convenience, security and low cost. 

You may back up any data from one or two documents or photos to the entire contents of your computer, with virtually no limitation on storage space. Some providers supply limited storage free of charge, but generally the cost of backups increases proportionally to the amount of data involved. 

There are many providers of online backup. These include internet service providers (ISPs), internet security software vendors and companies such as Apple with the iCloud – to specialists. 

Increasingly, the Cloud is being used for not only backups but primary storage. This enables you to access your data from any computer, smartphone or tablet anywhere in the world without having to carry the data with you, with its associated security risks. Using the Cloud for primary storage also ensures data security as providers back up your data as well as storing it. This overcomes most of the risks associated with storing data stored on your computer. 

  • Other Advice

Do not use USB memory sticks, recordable CDs or DVDs to back up your data. Although these may appear to be inexpensive and convenient methods, they share limited capacity and are also easily lost or stolen. CDs and DVDs are also very slow to transfer your data. 

Be Safe: Firewalls

a253fe23-4fb7-48d2-b52f-f52cb0e82734_57.jpg

Automated attack tools are always seeking ways to break into and take over your system. Severe attacks may delete important data, crash your system, spawn new attacks, or even steal personal information, such as passwords and credit card numbers. A firewall can help protect your computer by blocking potentially hostile connection attempts. Unit firewalls (firewalls that are designed to help protect multiple computers in a university department, or a home or apartment complex network) and properly configured personal firewalls (firewalls that you can install on your own computer) can each provide effective security to suit various needs. For home use, personal firewalls are often free.

Important: Windows 7 and Mac OS X have built-in firewalls. It is important to ensure your firewall is enabled for complete protection. Many Linux or other UNIX-based systems also have firewall or filtering capabilities that should be enabled.

Be Safe: Malware

Malware, or malicious software, is hostile, intrusive, or annoying code that includes viruses, spyware, adware, worms, trojan horses, and other unwanted programs.

Malware and spyware are written and released on a daily basis. Many of the more common malware morphs or changes frequently to make them more difficult to detect. Malware spreads rapidly and by many different ways: for example, via e-mail attachments; infected document files; Web sites that contain hostile code that can infect your computer through vulnerable browsers; and unprotected fileshares. Your computer may be vulnerable to virus attacks if you are not using antivirus software and updating it regularly. 

120px_malware2_0.jpg

Spyware is often installed as a component of freeware programs, including some peer-to-peer (P2P) applications. Most modern antivirus programs contain mitigation technologies for spyware. To further protect yourself from spyware, be cautious when downloading freeware or accepting free downloads.

To protect your computer from malware or spyware, download Symantec AntiVirus and be sure to set it up for automatic updates. Note that new computers often come with trial versions of antivirus software, and having two different antivirus programs installed on one computer can cause conflicts. Always uninstall the antivirus software that came on your computer before installing the Symantec software.

Be Safe: Phishing Tips

Phishing involves fraudulent email requests for personal information.The goal of a phishing scam is to steal your valuable personal data, such as credit card numbers, passwords, account data, and other information. The con artists who design phishing scams send out millions of fraudulent email messages that appear to come from organizations you know and trust, like your bank, credit card company, or school. The email will direct you to provide personal information such as your bank account number or social security number. The bogus e-mails often include links to authentic-looking Web sites that have logos taken directly from legitimate Web sites. If you think you've received a phishing email message, do not respond to it.

Many people think that computer security concerns only relate to viruses, but personal security is equally important. There are numerous types of fraud that can endanger computer users on a personal level—and email is an extremely effective way to distribute fraudulent messages to potential victims.

Privacy protection has become essential today because of the wide spectrum of dangers including identity theft, email hoaxes, phishing scams (fake email messages that request sensitive data), malicious attacks and spyware technologies which increasingly target Internet users. If it looks too good to be true ... for example, you receive a message that says you won $3 million from an online lottery you've never heard of ... then it is too good to be true. No matter how tempting it seems, never respond to a message that asks you to send money or personal information.

On occasion, phishing scams are directed at students, faculty and staff. Fraudulent email appearing to come from official government offices invites the reader to click on a link or share private information. In the case of a compromised account or an incident involving sensitive information, contact your IT Administrator / Security Manager. For cases of harassment or direct threats, contact your local police department.

Be Safe: Secure Passwords

Your digital identity and computer security are only as safe as your passwords. Make sure you have strong, safe passwords for your computer, and systems that store your important data and confidential information. A common method by which intruders break into computer systems is through administrator accounts that have no passwords. Similarly, malicious individuals often enter systems by cracking a poor user password, logging in, and exploiting your information and computer access. Therefore, selecting a good password initially and changing it periodically are important ways to avoid having your computer or account compromised.

images (1).jpg   

Use Identity Safe:

https://identitysafe.norton.com/

Use Password Generator:

https://identitysafe.norton.com/password-generator/

Important: Your password is the key to many electronic services. Guard your password just as you guard your bank card PIN. Don't write it down or make it easy for someone to crack. Never share your password with others.

Be Safe: Security Updates

Relying on the fact that many computer users fail to install software patches on their machines, hackers create worms to take advantage of these vulnerabilities. Most software vendors, including Microsoft and Apple, offer updates to correct security gaps that worms and other malicious programs can use to attack your computer. Running Symantec AntiVirus is not enough. You can configure your computer to automatically seek out updates for hassle-free security.

Microsoft-Announces-Critical-Security-Updates-for-Windows-Internet-Explorer-388300-2.jpg

How to schedule automatic updates:

Important: If you are running Windows 7, we strongly recommend that you install the Windows 7 Service Pack are up to date. 

Be Safe: Social Networking

Social networking Web sites such as Facebook and MySpace make it easy to meet people on a personal or professional level. By providing personal information using blogs, chat, email, or instant messaging, you can meet new friends and communicate with others who share your interests. However, digital relationships can be deceptive. Watch out for computer security dangers such as phishing schemes, spyware downloads, and Internet fraud. Never share your password with anyone or provide credit card or social security numbers insecurely.

120px_social_media_1.jpg

Remember: Information you share online potentially available to the world—friends and strangers alike. Although social networking sites create an illusion of intimacy, they are not private. They are easily accessible not only to school administrators, potential employers, and law enforcement officials—but to scam artists and criminals. If you use social networks, you should also be aware that what you post may not be appropriate, may be misinterpreted, or may cause harm to your reputation. Some individuals have been expelled from school, lost out on great job offers, or had grad school admissions withdrawn because of pictures or statements they posted. Others have become the victims of stalking, identity theft, or other crimes.

Important: Windows 7 and Mac OS X have built-in firewalls. It is important to ensure your firewall is enabled for complete protection. Many Linux or other UNIX-based systems also have firewall or filtering capabilities that should be enabled.

Is someone hacking into my account

Changing your password is a good measure if you fear that somebody might have been illegally using your account, but the mails you have been receiving recently are probably caused by a virus and not by a hacking attempt into your account.

There are a number of viruses/worms that can forge the sender's address (the virus designated "Klez" is one of them, for instance). The main characteristic such viruses share is that they all make the infected machine send email messages (containing the virus in their turn) to any email address it finds in the user's contact email list. The subject line and name of the attached file (typically with the .exe, .pif, .bat, or .scr extension) are random and do not have a specific label.

Many users have received email messages which appear to be from webmaster@us.govpostmaster@us.gov, as well as several others when in fact, the messages are not from those senders.

You should forward the infected email showing the FULL headers of the infected mail to your Email security department / IT security department.

Only by looking at those headers the people at the Security Operations and Services might be able to determine the real sender of the mail in question and, in case the email came from any company domain, block the infected computer from sending out more email until it is disinfected.

Never open an email attachment you were not expecting. Be certain you have an updated version of anti-virus software.

Here are few tips for safely using email and the web

  1. Use caution when opening email attachments. Email attachments (files attached to email messages) are a primary source of virus infection. Never open an attachment from someone you don't know. If you know the sender but weren't expecting an attachment, verify that the sender actually sent the attachment before you open it.

  2. Guard your personal information carefully. If a website asks for a credit card number, bank information, or other personal information, make sure you trust the website and verify that its transaction system is secure.

  3. Be careful when clicking hyperlinks in email messages. Hyperlinks (links that open websites when you click them) are often used as part of phishing and spyware scams, but they can also transmit viruses. Only click links in email messages that you trust.

  4. Only install addons from websites that you trust. Web browser addons allow webpages to display things like toolbars, stock tickers, video, and animation. However, addons can also install spyware or other malicious software. If a website asks you to install an addon, make sure that you trust it before doing so.


Viewing all articles
Browse latest Browse all 5094

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>