Check if your PC is safe and protected from viruses and on the internet

Those who care about data security and privacy when surfing the internet should be fully aware of how important it is to protect your computer and keep it away from external intrusions.
Not everyone, however, is careful to cover all the various vulnerabilities so, to also take a test, we see a checklist to verify that enough has been done and that nothing has been left to chance.
The Internet security topic can be divided into four parts: computer and home network protection, passwords, browsers, surfing on wifi networks .
For each of these categories we will see all that should be done to have a minimum level of security until completely armoring the system and any data transferred on the web and on the network.
As in a test, on each point of the checklist you can put a cross next to it if it has been satisfied or take the necessary precautions to increase the level of security on the internet.
READ ALSO: Verify network security by simulating hacker attacks
1) Computer security
An antivirus has been installed "> Recommended free antivirus.
□ Is a firewall installed?
If you have Windows 7 and if you surf the internet using a router at home, you don't need a firewall program.
If needed, you can download a free firewall to protect the network and block intrusions.
□ Is Windows (or Mac) updated and updated automatically and regularly?
Many neglect or forget to update Windows with the patches that Microsoft distributes every week.
These updates are always security patches that cover the latest discovered holes that allow malicious users to enter PCs from outside and take control of them.
Verify that the Windows Update service is active from the Control Panel.
These three checklist questions are the basic rules for computer security.
Even Mac users should definitely not underestimate security updates.
Have you set up a backup plan for your data, documents and photos?
For the security of not losing the files created and saved on your computer, schedule automatic backup so you can have a double backup copy.
In another article, the best free programs to make automatic and incremental backups.
If you don't have too much data to back up, it can be much easier and faster to make an online backup on cloud storage services like Dropbox and Skydrive.
□ Do you keep the programs installed on your computer up to date?
As with Windows, security updates often come out for programs.
For those who want, there are ways to automatically update programs and software installed on your computer.
When you download programs, are you careful in the installation procedure not to also install other "recommended" software?
Unfortunately, many free programs are accompanied by sponsors, so-called "crapware", in the form of unsolicited programs that install themselves automatically.
If so, check to find and remove unnecessary programs and toolbars that slow down your computer.
2) Browser security
The fact that your computer is protected from viruses and external intrusions does not guarantee that browsing is still safe and private.
Many people may not care about privacy, but security still remains paramount.
When you log in with a password to a site, do you always check that the address starts with https?
HTPPS is the protocol of the encrypted connection and differs from the normal http in that every data transmitted in https is encrypted.
This means that even if you want to sniff network traffic, what is written in https is illegible for anyone, including the operators of that site.
The HTTPS Everywhere browser extension highlights secure sites and ensures that you are always in HTTPS where available (see article Surfing https on banking sites, online stores, Facebook with secure connection).
Can you recognize, by eye, the dangerous sites where you have to be careful when you click?
If you still can't distinguish a good site from a bad one by eye and you always have paranoia or bad faith towards any site other than the most famous ones, then you can install some extensions like WOT to avoid clicking dangerous links and suspicious sites
When you connect to a site from a computer not used only by you, do you always log out of the account?
Always remember to log out of all accounts that are used on a public computer or shared with other people, including family members.
Do you know the basics of scams and online fraud?
Knowing what phishing, malware and other dangers are on the internet is important to stay away from him.
In another article, the list of the main cybercrimes and dangers .
Top level : □ Protect your browser from online tracking?
As already explained, not being tracked online by sites means blocking the collection of data.
This is possible through some extensions to be installed on the browser.
The maximum level of protection and privacy on the internet is anonymous browsing.
Surfing completely anonymously is not useful at all and cannot be done for any situation.
It can be useful when you are doing something illegal (but as good as downloading torrents), when you don't want to share your geographic location or when you want to falsify the IP address to access blocked sites.
Even if you can surf the internet anonymously in several ways, online privacy is only guaranteed with TOR.
3) Security of passwords used online
Do you use strong passwords?
One of the most frequent mistakes among internet surfers is to use simple passwords or that refer to facts or events in personal life.
You must always choose passwords that are impossible to discover and, above all, generate a strong password for all websites, without giving anyone the possibility to guess it (never use the date of birth, the team of the heart or the name of the wife or dog) .
Do you use different passwords for each site?
You should never reuse the same email and password combo combination in multiple services because if a hacker manages to enter that Email account, he will be able to violate every personal account effortlessly.
To get an idea, see the most used techniques to steal passwords.
To manage the different passwords just use a program to create and manage passwords for web accounts.
Top level : Where possible (Dropbox, Google, Gmail and Facebook) two factor authentication can be used.
To begin with, you can read the Google and Gmail login guide with two-step verification.
For added protection, be sure to check the app permissions on Facebook and Twitter.
4) Network security
Is your home Wifi network protected with a WPA2 key?
If not, or if you have no idea what WPA2 is, consult the guide to configure a Wireless Router for a secure wifi network
Are you aware that when you connect to an open wifi network, everything you do is visible from the outside of your computer ?
As shown, sniffing the net and intercepting internet traffic is really simple.
The only thing that protects the security of internet passwords in a public wifi network is the HTTPS protocol mentioned in the first question of point two.
In another article, the complete guide to connect to the public wifi network preventing data from being visible to others and how to surf safely while traveling
Have you checked the shared folders on your computer?
As shown, entering PCs and seeing shared folders on other computers is very easy.
Very often the operation is successful because people forget to remove the sharing of folders or the entire hard disk on the computer.
In another guide: how to manage shared folder permissions in Windows
Upper Level : To use a computer in complete anonymity and to connect to the network without leaving a trace, you can use an anonymous and private Linux system such as Tails.
Safety is important for everyone, from the expert technician to the computer illiterate.
The level of precautions to be taken is at your discretion, but keep in mind that online security is just as important (if not more) than home security today.

Leave Your Comment

Please enter your comment!
Please enter your name here