{"id":918,"date":"2009-04-11T12:36:02","date_gmt":"2009-04-11T17:36:02","guid":{"rendered":"http:\/\/www.bspcn.com\/2009\/04\/11\/10-easy-ways-to-boost-your-online-security\/"},"modified":"2009-04-11T12:36:02","modified_gmt":"2009-04-11T17:36:02","slug":"10-easy-ways-to-boost-your-online-security","status":"publish","type":"post","link":"http:\/\/localhost\/wordpress\/2009\/04\/11\/10-easy-ways-to-boost-your-online-security\/","title":{"rendered":"10 easy ways to boost your online security"},"content":{"rendered":"\n

Written by Nick Peers<\/a><\/p>\n

\"web-of-trust\"<\/p>\n

The Web of Trust plug-in makes it clear if a site is deemed unsafe<\/p>\n

Many people think that installing anti-virus, firewall and anti-spyware software should inoculate them from all manner of threats.<\/p>\n

The truth is, you need to be a bit more savvy than that.<\/p>\n

Read on to find out 10 really easy ways to close the security holes that still remain on your PC.<\/p>\n

And if you’re called upon to clean the junk off a friend or relative’s PC this Easter break, you might want to share this link with them to save you getting called back out again in a week.<\/p>\n

1. Augment your anti-virus tool<\/strong>
Threatfire<\/a> is designed to work alongside existing security products. Unlike traditional anti-virus tools, it doesn’t rely on signatures to identify malware; instead, it monitors your PC for suspicious malware-like behaviour. The only time you’ll hear from the program is when it’s found something suspicious; otherwise it’ll sit silently in the background.<\/p>\n

2. Switch to plain text mail<\/strong>
HTML can be used to hide all sorts of unpleasant things in email. Set your mail program to view all messages as plain text by default – you should see an option for viewing inpidual messages as HTML when you trust the sender.<\/p>\n

3. Don’t click mail links<\/strong>
Never visit web sites by clicking links in your email unless you’re 100 per cent sure the link is safe. This is especially true for emails purporting to come from financial institutions asking you to log in to verify your account details – 99.9% are scams (the other 0.1% are irresponsible).<\/p>\n

4. Vet your email<\/strong>
Most anti-spam tools only process email that’s been downloaded from your mail server – install
PopTray<\/a> and you can check and preview your mail while it’s still on the server, deleting unwanted and suspicious messages without exposing them to your mail program.<\/p>\n

\"\"<\/p>\n

5. Switch web browser<\/strong>
Upgrade to the
latest version of Internet Explorer<\/a> or switch to a browser that doesn’t support potentially malicious Active-X controls such as Firefox, Opera or Google Chrome. Check the browser’s privacy and security settings are set to Medium High or greater.<\/p>\n

6. Check web sites before you visit<\/strong>
Install the free
Web of Trust<\/a> plug-in for Internet Explorer or Firefox (Chrome will be supported once the browser supports third-party add-ons), and you’ll be in a better position to avoid unsafe web sites thanks to its traffic-light system for both sites and search engine results.<\/p>\n

7. Manage your passwords<\/strong>
A password manager such as
KeePass<\/a> enables you to securely and easily enter your passwords into any program. As you only need to remember one master password to use the program, there’s no excuse to use the same password across all your online accounts (the program will even generate secure, random passwords for you).<\/p>\n

\"\"<\/p>\n

8. Screen all downloads<\/strong>
Never open attachments or downloads directly – save the file to your hard drive, right-click it and run a quick scan with your security tool of choice prior to opening it. When downloading files, make sure you download from a reputable web site (typically the program’s own home page or a respected download site) – the WOT plug-in will help here.<\/p>\n

9. P2P basics<\/strong>
Peer-to-peer networks are a breeding ground for malicious software, particularly in content that’s been copyrighted. If you can’t live without P2P, pick a trusted provider and client (such as
uTorrent<\/a>). Be careful what you share, and scan all downloads prior to opening them.<\/p>\n

10. Create a virtual sandbox<\/strong>
Sandboxie<\/a> enables you to run any program in a protected and isolated space on your hard drive. Changes made are discarded when you close the sandbox, so you can surf the web and open mail attachments without fear of malware sneaking on to your PC.<\/p>\n","protected":false},"excerpt":{"rendered":"

Written by Nick Peers The Web of Trust plug-in makes it clear if a site is deemed unsafe Many people think that installing anti-virus, firewall and anti-spyware software should inoculate them from all manner of threats. The truth is, you need to be a bit more savvy than that. Read on to find out 10 […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[],"_links":{"self":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts\/918"}],"collection":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/comments?post=918"}],"version-history":[{"count":0,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/posts\/918\/revisions"}],"wp:attachment":[{"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/media?parent=918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/categories?post=918"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/localhost\/wordpress\/wp-json\/wp\/v2\/tags?post=918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}