Open for Add

Header ADS

What is desktop security?

             




 Use your personal computer or Laptop Safely.


In this document I explained the minimum requirement of security settings for personal computer or Laptops, which you cannot avoid and it's recommended to maintain this minimum-security standard as a protection.

Personal computer security, which we called “desktop security “and it’s very essential for everyone to maintain a strong, reliable, and secure connectivity to safeguarding from external threat. Our personal computer or Laptops connect with internet, either through with wired network or wireless network for internet access. If your personal system not protected then hackers can access that system and will send thousands of illegal e-mails and cause you to lose your network access. Information technology security provides layers of protection for your personal computer, laptops to safeguard from hackers or unwanted traffic from the internet.

So, protection of your systems is must and without such protection, you should not connect your system to the internet or any network. Some common actions are there through which you can keep your system protected from any untheorized access. Your system should be password protected to restrict unauthorised use.  Enabling a screen saver with password access is a very good practice, it will give a short-term security to protect your system when you leave your desk keeping your system ( PC) or Laptops ON for a few minutes. Your computer’s screen saver will initiate after 5 minutes of inactivity.

You have to entire a password before deactivating the screen saver to gains access to the system after your return. There is a good alternative of shutting down a system when you are leaving your desk for a longer time and that you can do pressing and holding the key showing “ flying window” symbol and then pressing the “ L “ key, this operation will lock the keyboard and blank the monitor screen till the time you provide a valid password to open. Hackers can hack the system if you transfer a file insecure manner. Files those you are transferring from your computer mostly those are plain text and transferring using FTP or TELNET. TEXT file is always readable as it’s in plain English and also having your ID, password and personal information.

However, if you do the secure transmission through secure file transfer application such as SSH and PGP then it will provide good protection against this hacking, because of encryption. These applications provide encryption when you transferring the file through these applications. What is encryption ? will share that in a different article.  Just, in short, encryption provides In technical terms, it is the process of converting plaintext to ciphertext.

Important things to remember, when using your personal computer or Laptops. 
  1. When you are installing any software always try to install licensed software so that you have regular updates of your operating system and applications. For open-source software, make sure to update those frequently.
  2. Please check the “Terms and Conditions”, “License Agreement” provided by vendor/software before installation.
  3. You should properly shut down and switch off your personal computer (PC) after the use. Also, you should ensure proper switch off all connected external devices like Monitor, Modem, Speakers etc.

The Importance of Adequate Desktop Security:

You can protect your personal computer or laptop and its  data on it, but when a machine is connected in the network and compromised, then one of the most common consequences is that it is used by the hacker to launch or attempts to break that system, or disturb the service which is on along with systems located anywhere on the Internet. Due to lack of security networks becomes under threat of hackers, male ware, virus etc.

Desktop Security Guidelines:

The following desktop security guidelines are relevant for all users, irrespective of any  operating system is being used:

  • Install Anti-virus and maintain the update the same properly and ensure regular scanning or if it is connected with the network then  then real-time updating and protection scans all files as per schedule defined.
  • Avoid opening unknown e-mail attachments unless you know the sender.
  • Always practice to use complex passwords and the same should not write down anywhere or share them with anyone. You also should not share your password with anybody.
  • While you sharing files from your machine, ensure the access is protected with a complex password.
  • Always keep your data backed up. 
  • Ensure your OS version (e.g. Microsoft ) current update for critical security updates, it will protect from external threat.
Password direction you should follow:

All organisation having their password policy to maintain. A good password policy is the base of the security.  Here are some ideas for selecting a complex password: 
  • Ensure all password should be at least 8-10 characters in length.
  • All password should have at least one character, lowercase letters, uppercase letters, numbers, punctuation/special characters (e.g. $, %, &, etc.) within the first 8 characters of the password.
  • Password should not contain any words found in the dictionary, this should not be a part of your full name or account name, or date of birth, license plate number etc.
  • Avoid using the same password for all systems.

Hope this will help you to develop a strong password and you can able to protect your personal computer or Laptop from external threat. If this is helped you,  request you to share this post with your friends and at the same time subscribe to my blog so that all my new posts on technology update can reach you immediately. Thanks for visiting The Blog-insider.  


No comments

Powered by Blogger.