Lhe.io

  • Apps
  • Tech
  • Gadgets
  • Coding
  • E-Commerce
  • Hosting
  • Deals
  • Trending
  • Hot
  • Popular
  • Advertise
sections
  • Apps
  • Affiliate Marketing
  • Blogging
  • Coding
  • Culture
  • Deals
  • E-Commerce
  • Entertainment
  • Freelance
  • Gadgets
  • Health & Fitness
  • Hosting
  • Insights
  • Internet
  • Science
  • Social Media
  • Startups
  • Tech
  • Travel
  • WordPress
Lhe.io Connect with us!
  • Trending
  • Hot
  • Popular
  • Advertise

Lhe.io

9 Simple ways to protect your personal computers and online...

Post Pagination

  • Next PostNext
  1. Home
  2. Internet
  3. 9 Simple ways to protect your personal computers and online accounts from the crooks
6 years ago 6 years ago

Internet

9 Simple ways to protect your personal computers and online accounts from the crooks

Securing your system is no more a problem.


Ramsha Khan
by Ramsha Khan 6 years ago6 years ago
2
30
ShareTweet
30 shares
computer_security

Just like food and water, internet has become the basic need of computers. Internet is very useful as it helps in every way. Along with pros, it also has some cons. Internet security is one of the major issues these days. Everyone is concerned about their sensitive data whether it is stored on PCs or in online accounts. These concerns can be secured by just following few simple steps of protection. Following are the 9 simple steps you secure your personal computers and online accounts:

1. Delete the Pre-installed Applications and Software

Pre-installed applications and software has become dangerous since Lenovo systems got attacked by Man-in-the-Middle. Man-in-the-Middle also called MiM, is a malicious software that alters the communication between two systems as if they are actually conversing in that way. Get rid of the bloatware as it is of no use and can be attacked by third party easily. It is a useful practice.

2. Use Secured Browser

Internet users require a web browser to browse daily. They need to choose browser very carefully as wrong choice of browser may bring many cookies and other harmful attacks for their systems. Right choice of browser protects system from many malwares and thus safeguards. Web browser should be installed according to the age of your system. And for the best choice Google Chrome is on top of the list. Google Chrome has Sandbox through which it provides security to the systems. Moreover second choice should be Mozilla Firefox. Basically user should be aware of  his requirement and then match those requirements with browser before installing it.

3. Mighty Password

Whether we talk about systems or online accounts, they are facing security risk if their password is weak. Following points should be considered while choosing a password.

  • Password should contain more than 8 characters.
  • Lower and upper case alphabets should be used to make password stronger.
  • Usage of such words which can easily be remembered by user.
  • Symbols, numeric figures or punctuation makes password more complex.
  • Always use different password for different accounts. If it is difficult to remember different passwords for different account, use Password Manager.

4. Enable the VPN

In order to secure internet and get protection fro privacy and protection against malware, Virtual Private Network (HotSpot shield) should be enabled. It is a free software (also have public Wi-Fi security)  and it provides security as it safeguards from intruders and doesn’t allow any malicious interruption from same Wi-Fi network.

5. Two-Factor (2F) Authentication

In routine, users may come across many cyber criminals at every nooks and corner even without knowing. For such criminals every online account whether it is of Google, Apple, Microsoft, Yahoo or of Facebook, it should be protected with 2 factor authentication. For it, user would be needing a password at the first stage of login and then a pin code will be sent to the user’s most trusted and secured device such as their personal smartphone etc, for authentication. It is the most effective way to protect your online accounts and social networks from hackers.

6. Security from Phishing

Phishing is one of the cyber crime that is very common, in it user is asked to give his/her personal information to the illegal websites. It can further be used for any fraud. Following are they points to consider in order to protect your system from such websites

  • Unknown emails/spams that ask personal or financial information should not be opened.
  • If you are doing financial transaction always check “HTTPS” in the URL bar it means it is secured. If it is “HTTP” then it is not secured.
  • Don’t even give inputs in the pop-ups.
  • Even if you know the email’s recipient, don’t send personal or financial information there.
  • Check your bank statements regularly.
  • Personal computers should be protected with anti-virus programs.
  • Ensure that anti-virus is strong.

7. Use HTTPS Everywhere Plugins

HTTPS plugin is basically an invention of Electronic Frontier Foundation. It converts the insecure websites into secure ones by just using “HTTPS” extension. So the “HTTPS Extension Everywhere” plugin should be used in every web browsers for the security purposes.

8. TOR Browsing

Tor is short for The Onion Router and was initially a worldwide network of servers developed with the U.S. Navy that enabled people to browse the internet anonymously. Now, it’s a non-profit organization whose main purpose is the research and development of online privacy tools.

TOR is a software, free of cost. It doesn’t let cyber criminal or even intelligence agencies know about one’s browsing history. Thus it should be used for anonymous browsing.

9. Physical Security of Systems

In order to ensure to physical security of the personal computers, BIOS program and password should be used. BIOS program helps system in booting process and initialization of hardware. It is important to memorize BIOS password as it cannot be retrieved easily. Moreover data should not be stored in third places or in USB’s as these sources cannot protect data thus you may loose it.

To Read More: Key Differences between Shared Hosting and Dedicated Hosting Services


Account Protection, Anonymous Network, Cyber Protection Tools, Internet Security, Protection, Security, TOR Browing

Like it? Share with your friends!

30
ShareTweet
30 shares
Ramsha Khan

Posted by Ramsha Khan

Ramsha is a freelance writer, lives in Lahore, Pakistan.

2 Comments

Cancel reply

Your email address will not be published. Required fields are marked *

  1. Pingback: Selfie is useful for hackers to extract smartphones PIN - Corneal Key Logger – Lhe.io
  2. Pingback: Canadian Immigration site keeps crash on U.S. election night – Lhe.io
  • Previous Post
    MS-Excel
    70 MS-Excel shortcut keys you should know
    by Tayyaba Irshad
  • Next Post
    Hosting
    Key Differences between Shared Hosting and Dedicated Hosting Services
    by attacomsian

Get The Newsletter

LIKE WHAT YOU'RE READING?
subscribe to our top stories

Don't worry, we don't spam

You may also like

  • 3

    Uber Movement: Lets Find Smarter Ways Forward

  • 7
    Google Pixel Phone

    Google Pixel hacked by Chinese team in under 60 seconds

  • 7
    Network Cables

    Brutal DDoS attack shutdown half of the Internet — here’s how

More From: Internet

  • 3
    dropbox

    Dropbox Released Final Version Of Dropbox Paper

  • 3
    linux-153455_1280

    10 Best Websites To Learn Linux Online

  • 5
    gettyimages-622118684-a8d888db-c86a-47e4-a9df-194f6e2a0b0c

    Google Banned Publishers In Crackdown On Fake News

DON'T MISS

  • 20

    Top 10 Black Friday/Cyber Monday 2019 Hosting Deals You Should Not Miss

  • 130
    Black Friday & Cyber Monday Deals 2016

    88% Discount: Top Black Friday & Cyber Monday Hosting Deals (2019 Edition)

  • 1
    DreamHost

    DreamHost 50% Off Web Hosting Black Friday & Cyber Monday Sale 2019

LIKE WHAT YOU'RE READING?
subscribe to our top stories

Don't worry, we don't spam

Trending

  • 1

    Bluehost India 51% Off Mid-Year Super Sale

  • 2

    How to start using Stripe with Payoneer even if you’re not in the US

About Us

Lhe.io is a growing technology platform that covers things related to tech, e-commerce, freelance, blogging and web development.

Every week, we publish posts that include tips, tricks, techniques, tutorials, tools recommendations, service reviews and freebies that bloggers, tech enthusiasts, entrepreneurs and web developers would love.

Sections

  • Apps
  • Affiliate Marketing
  • Blogging
  • Coding
  • Culture
  • Deals
  • E-Commerce
  • Entertainment
  • Freelance
  • Gadgets
  • Health & Fitness
  • Hosting
  • Insights
  • Internet
  • Science
  • Social Media
  • Startups
  • Tech
  • Travel
  • WordPress

Our Services

  • WordPress Website Design
  • WordPress Hosting
  • WordPress Support
  • Free Blog Setup
  • Useful Resources

Proudly hosted on InMotion Hosting! Developed using BoomBox WordPress theme.

  • Contact
  • Privacy
  • Terms
  • Disclaimer
  • FTC Disclosure
© 2022 Lhe.io All Rights Reserved

log in

Become a part of our community!

Captcha!
Forgot password?

reset password

Back to
log in