USE ANTI-VIRUS SOFTWARE
Anti-virus software can monitor for malware intrusion, provide warnings in advance of potential file damage and assist with scanning attachments. There are several high-quality providers of anti-virus software including McAfee and Symantec. It is important to subscribe to ongoing updates.
INSTALL A FIREWALL
A firewall can help protect your personal computer and business network by blocking intrusion and some types of unauthorized access.
TRUST YOUR COMMON SENSE
Be wary of opening unexpected attachments or clicking on unfamiliar URLs. If you are unsure, ask someone who may be more familiar. If you are still not comfortable – don’t open or download it.
SEEK PROFESSIONAL ADVICE
If you are concerned about safety for your home computer or business network – consider using the services of a computer safety consultant.
BACKUP YOUR COMPUTER
Consider purchasing an external hard drive or subscribing to an online backup service.
UPDATE YOUR SOFTWARE
Software companies provide updates to their programs as they discover opportunities for improving security.
Anti-virus software can monitor for malware intrusion, provide warnings in advance of potential file damage and assist with scanning attachments. There are several high-quality providers of anti-virus software including McAfee and Symantec. It is important to subscribe to ongoing updates.
INSTALL A FIREWALL
A firewall can help protect your personal computer and business network by blocking intrusion and some types of unauthorized access.
TRUST YOUR COMMON SENSE
Be wary of opening unexpected attachments or clicking on unfamiliar URLs. If you are unsure, ask someone who may be more familiar. If you are still not comfortable – don’t open or download it.
If you are concerned about safety for your home computer or business network – consider using the services of a computer safety consultant.
BACKUP YOUR COMPUTER
Consider purchasing an external hard drive or subscribing to an online backup service.
UPDATE YOUR SOFTWARE
Software companies provide updates to their programs as they discover opportunities for improving security.
PROTECTING YOUR MOBILE PHONE
Here a few precautions that should be evaluated for your smartphone. Remember, there are many varieties of phones so it's best to ask your wireless provider about available security features for your particular model. Citywide Banks does not endorse or guarantee any phone model, feature, or wireless provider.
Here a few precautions that should be evaluated for your smartphone. Remember, there are many varieties of phones so it's best to ask your wireless provider about available security features for your particular model. Citywide Banks does not endorse or guarantee any phone model, feature, or wireless provider.
Safety Tips to Protect Your Mobile Phone
- Password-protect your mobile device. When creating a password, choose one that’s easy for you to remember but will be difficult for others to guess. Also, don’t share your password with anyone or tape it to your mobile device.
- Utilize your phone's auto-lock security feature. Make sure your auto-lock feature is turned on so it will kick in after a couple minutes. That helps ensure no one will be able to use the phone or tablet without knowing your password.
- Install lock-sensitive applications. Another useful way to protect personal data on smartphones is to make use of an application locker utility which prevents unauthorized access to applications that contain sensitive personal information.
- Enable real-time protection. This ensures that all files stored on your mobile device are analyzed each time you attempt to access them.
- Activate the encryption feature (if it’s built in). While encryption offers some protection and may prevent unauthorized access to your mobile data, many mobile devices don’t include this feature in their operating systems. Check the owner’s manual to see if your phone has encryption, and make sure the feature is included when you purchase a new phone.
- When purchasing a Smartphone, know the features of the device, including the default settings. Turn off features of the device not needed to minimize the attack surface of the device.
- With the growth of the application (apps) market for mobile devices, users should look at the reviews of the developer/company who published the application.
- Review and understand the permissions you are giving when you download applications.
- Obtain malware protection for your mobile device. Look for applications that specialize in antivirus or file integrity that helps protect your device from rogue applications and malware.
- Be aware of applications that enable Geo-location. The application will track the user's location anywhere. This application can be used for marketing, but can be used by malicious actors raising concerns of assisting a possible stalker and/or burglaries.
- Jailbreak or rooting is used to remove certain restrictions imposed by the device manufacturer or cell phone carrier. This allows the user nearly unregulated control over what programs can be installed and how the device can be used. However, this procedure often involves exploiting significant security vulnerabilities and increases the attack surface of the device. Anytime a user, application or service runs in "unrestricted" or "system" level within an operation system, it allows any compromise to take full control of the device.
- Do not allow your device to connect to unknown wireless networks. These networks could be rogue access points that capture information passed between your device and a legitimate server.
- If you decide to sell your device or trade it in, make sure you wipe the device (reset it to factory default) to avoid leaving personal data on the device.
- Smartphones require updates to run applications and firmware. If users neglect this it increases the risk of having their device hacked or compromised.
- Avoid clicking on or otherwise downloading software or links from unknown sources.
You should regularly re-evaluate your current mobile security applications and the need for further protection.
If you suspect illegal access or other fraudulent activity within your bank account, please contact your banker or call customer service immediately – 303-365-3650.
Thanks! It's also essential that businesses protect their hardware computer systems as well. Last year my systems went down unexpectedly due to overheating. This was caused from a lack of a network rack.
ReplyDeleteHey, I had a great time reading your website. Would you please consider adding a link to my website on your page. Please email me back.
ReplyDeleteRegards,
Joel
JHouston791 gmail.com