Proper reviews of a computer system's security are a must, regardless of
whether you are in a home or business environment. Intruders will attack any
vulnerable computer system, regardless of its purpose, and you must stay on top
of security issues before they become threats. Fortunately, basic computer
system security reviews are not difficult to perform, and the procedure can be
standardized to both home and business users.
Items you will need
- Administrator
access
- Internet
access
Step 1
Begin by logging in to your computer with the Administrator account. Open
the "Control Panel," and look in the "Users" section.
Verify that the Guest Account is disabled and that no accounts have been
created that should not be there. If you are on a server, check the "User
Management" panel and verify that no unauthorized users have been added.
Step 2
Verify that you have an antivirus program installed and running. If not,
install an antivirus program immediately (such as Avira AntiVir, AVG or Comodo
Internet Security), and change its settings to run a scan every night, as well
as performing live scanning whenever files are downloaded or accessed. You
should also scan incoming email if you have email accounts on your computer. Do
this same process for an antimalware program.
Step 3
Look at your firewall logs (if any) and see if there have been any intrusion
attempts. Verify that the firewall is operational and that no rogue programs
have been added to its allow list. If you do not have a firewall installed,
install a software firewall on the computer (such as Comodo Internet Security or
ZoneAlarm).
Step 4
If you have network monitoring software installed, check its logs, and
ensure that no suspicious traffic has taken place on your network. Visually
verifying that each hardware access point (Ethernet jack) onto your network is
not being used by a third party is also a good way to verify your network
security.
Step 5
Review your router logs, if applicable, and check to make sure that your
wireless security is up to date. You should change your wireless encryption
password often, and if you work for a company, ensure that it is changed
whenever anyone leaves or is fired.
Step 6
Make sure that your computer systems are up to date with the latest security
patches for your operating system and programs by using Windows Update or
checking each program for updates.
No comments:
Post a Comment