There are some good practices around Internet security that everyone should know and follow. I’ve said them all, many times before … but it doesn’t hurt to repeat them now and then … so here they are.
Use strong passwords
Use strong (either long or complex) passwords for all your important online accounts. If you use a “local” account to log into Windows, consider switching to a “Microsoft” account for extra security there.
Be confident of your firewall
Between the firewall in your wireless modem or router, and the one in your operating system, you are well protected; in my opinion, there is no need to buy a third-party firewall (like the one included in an “Internet Security Suite”). If you are concerned about your firewall, there are a couple of things you can do. First, reset it; there are posted methods for doing that for most operating systems. Second, test it; I trust the ShieldsUP! page by Gibson’s Research (grc.com/shieldsup) to tell me if my firewall is vulnerable.
If you are running Windows, you should run at least one antimalware program
The built-in “Windows Defender” in Windows 10, or “Microsoft Security Essentials” in Windows 7/8, give you good basic protection. There are other good free and paid programs around as well; just make sure they are always current and running. You should consider running “second opinion” programs (like the free Malwarebytes) every month as well. These measures are valid, but not as pertinent, with other operating systems like OS X, iOS, Android, or Linux.
Use encryption whenever possible
Encrypted websites appear with a lock symbol in your browser. Make sure that symbol is there whenever you are on a site that you would like to communicate with privately, especially for ecommerce. If privacy of your email is a concern, look at using encrypted connections there as well.
Do your updates
Operating-system updates fix known bugs and security flaws, so do them!
Even if you are being very careful where you click, you may click on the wrong thing one day, and poof … there goes your data. To avoid this, you should have a backup procedure for your data that is either automated, or very easy … and detached from your computer so it doesn’t suffer the same fate as your main data (particularly fire, theft, or corruption). Teky uses the free Windows program SyncBack. You should also consider encrypting your data and/or your backup if they are vulnerable to theft. Teky suggests using BitLocker (built into Windows Pro/Enterprise) or VeraCrypt.