Saturday, December 17, 2005

Best Home Computing Practices

Human beings are the weakest link in today's IT Age. No matter how well-fortified your PC is, a leaked password or a thoughtless software installation can still do much harm. Hence, think about how you DO PC daily. The following best practices can help you enjoy a better experience with your Windows-based PC.

  1. Be selective about what links you click on the web, in email, or those received via Instant Messaging client (such as Yahoo!, MSN Chat and ICQ), even those from trusted sources. Some links are exploited by viruses or phishers to exploit security vulnerabilities to compromise your PC. Always check with senders on links received in emails/instant messaging chat sessions, when in doubt.
  2. Don't respond to every email or instant message requesting you to click on links to update profiles, especially user ID and passwords. Update your profile directly on the organization's website if you must.
  3. Don't click on links without a domain name (eg. http://203.xxx.xxx.xxx). These privately hosted servers may contain virus codes waiting to be unleashed on unsuspecting visitors.
  4. Don't launch file attachments received in email or found on websites, without first detaching them to a folder, and then scanning them with anti-virus and anti-spyware (updated with latest engines and signatures). If any spyware or virus is found, delete the file and avoid opening them, ever.
  5. Be selective about what information you send over the web. Do not send private information over normal http connections. If you must transact or submit private information, use only sites that support SSL connections (or https protocol), and only do such business with reputable organizations. Check internet forums for scams related to any suspected organizations.
  6. Be selective about what software you install on your system. Shareware or freeware may come with adware, spyware or other malicious software. Do a check with other users in forums before installing any software. Make it a practice to create a System Restore point before installing any software (including drivers) or updating any Windows registry settings. You can do this from Programs-Accessories-System Tools-System Restore & select to create a restore point.
  7. Always use a Windows account that's below the Administrator for day to day use, including internet surfing. Using an administrator account for all activities allows a virus or malicious code to wreak maximum havoc on your system. With a Power/Limited User account, your are already limiting the potential damage caused by any malicious code.
  8. Finally, data backup is a good practice that's still relevant. I backup all my mails and critical data files to CD monthly. You may backup to thumb drives and have it scheduled automatically. You may also use free webmail services such as Gmail or Yahoo to store date files (recommended to be encrypted or ZIPped with password before uploading; or avoid storing private and confidential data altogether). Or if you are willing to pay, there are online storage services that you can subscribe to. No matter what, ensure that your PC's recovery CD is always within reach for the last resort of having to re-install a crashed PC.

category:c4e1_security, c4e1_tips

No comments: