(615) 443-4842
PT are Protection and Threats techniques that can be used to protect your computer.

Physical Security

The most basic computer security is controlling who has access to it. The person that has access to it, controls it. Passwords, hidden files, and other security measures do not keep your computer from being physically damaged. This can cause loss of data and loss of software programs. Or, worse case scenario, your entire computer is stolen.

Think about it… work computers are left unattended for 16 hours a day. So your cleaning crew, an employee, or anyone else who has access to your office can steal your computer. Many people work at coffee shops and in coworking spaces like WeWork. They leave their computer unattended to go to their car or another room giving ample time for someone to take their laptop. Even handing your computer over to a computer tech could compromise your data. They may perform a hardware fix on your computer that causes loss of data. And they forgot to do a backup before they started working.

Deterring Physical Theft

Almost every laptop has a Kensington lock slot. A cable can be purchased that allows the laptop to be physically locked to a table, or other fixed object, reducing the likelihood of theft. If a Kensington lock is not available, other types of locks are available using ports on the laptop.

Desktops and servers have an extension, usually on the back, that allows a lock to be added to prevent the cover from being removed easily and having parts stolen from inside the desktop. Additionally, the same hole can be used to attach a cable from the computer to a stationary object, such as the desk.

Operating Software Security

It’s important to install software and operating system updates. Windows, Macs, and Linux computers all have built-in security to prevent attacks on your data and software. Keeping your software and operating system updated will help protect your computer from known and potential security hazards.

Another advantage to keeping your operating system up-to-date is protecting the applications you have installed. Generally, when you do an operating system update, it will break one or more of the applications on your computer. Then you have to update the application that is being affected so it works with the new operating system. This provides more protection for your applications and software.

Anti – Threat Techniques

Hardware

Computer network systems have firewalls that physically protect the data passing to and from the system by blocking entry to malware, viruses, and other malicious attempts to gain access to or destroy your data. Often firewall software works in sync with the physical hardware to provide more thorough protection as an additional deterrent to a malicious attack,

Software

Threats to computer systems include hackers, spyware, malware, viruses and key loggers.

To prevent these types of issues, Internet security software should be installed. Security software is only as good as its last update. Hundreds to thousands of new threats are being developed daily and released to wreak havoc.

Just as in everyday life, be aware of your surroundings and take action to protect you’re your computer systems and your business.

All the best,
Jim Nay

HTML Snippets Powered By : XYZScripts.com