Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • National Computer Security Day: Tips for Securing Your Home Computers
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

National Computer Security Day: Tips for Securing Your Home Computers

4 years ago Bob Covello
National Computer Security Day: Tips for Securing Your Home Computers

Tuesday, November 30th, is National Computer Security Day.  Although this special day has been around since 1988, many people are not only unaware of it, but are still also unaware of some of the basic security required for protecting their computing devices.

The rise of remote work has stretched the security perimeters of all corporations, and fortunately, there are products, such as Tripwire Enterprise that can help them to protect the organization, from the full computing systems, to data storage.  With features such as configuration management, compliance enforcement, as well as file integrity monitoring, Tripwire has a full range of products to protect an organization. 

Protecting your home computing environment is as important to you as protecting a corporate setting.  While some of the standard protections are obvious, such as having a good malware detection and prevention system, and a personal firewall, some others may not be as obvious.

Keep Your Backups Offline

One key piece of advice for corporations is to keep backups offline.   Since most ransomware will search all connected devices for files to encrypt, keeping the data separated will ensure that those backups are protected, ensuring easy restoration without having to pay the ransom.    Ransomware doesn’t discriminate.  While there are targeted attacks against large organizations in order to demand larger sums of money, attacks against individuals still occur. 

If you are using a cloud-based backup solution, disconnect from that backup, and activate it only when you need it.  If you are “old-school”, preferring to back up your files to an external storage unit, disconnect that device when you are not using it.  This simple step can protect you from being fully victimized if you suffer a ransomware attack.

Shut Down Unused Computers

Many people leave their computers running all the time.  This way, they are always ready to use it at an instant.  This made great sense back in the days of earlier generations of machines with slower processors and spinning disks.  Now, computers no longer take “forever” to boot up, so leaving it running all the time leaves it open to attack from open port vulnerabilities. 

In a corporate environment, port monitoring and management is made easier with a vulnerability management system, such as Tripwire’s IP360, however, in a home environment, managing open and vulnerable ports is not something the average person does.  The simple, solution is to shut off unused computers.  Another option is to adjust the power settings so that the computer goes into a low-power mode after a short period of idle time. 

Also, while there are conflicting ideologies about whether turning off an idle computer saves energy, money, and reduces wear on the components, one should consider their personal habits and thoughts on the subject, and decide accordingly.

Does Everyone Need to be a Local Admin?

In a corporate environment, computer permissions are tightly controlled, as the typical employee does not require full administrative rights to carry out the normal tasks of the workday.  This, along with a configuration management system also protects the environment against unplanned configuration changes.

This is also a good practice in a home environment.  Most of the time, all members of the family do not need to have full administrative rights on a computer in order to effectively use the system.  When an account is created, the creator is given the option to grant permissions to the account.  Accounts can also be adjusted after they are established on the system.

The best part about these tips for Computer Security Day is that they are all absolutely free!   We at Tripwire hope that you have a safe holiday season, and that your computing environment remains secure.

The post ” National Computer Security Day: Tips for Securing Your Home Computers” appeared first on TripWire

Source:TripWire – Bob Covello

Tags: Cloud, Finance, Low Severity, Malware, Ransomware, TripWire

Continue Reading

Previous IKEA Hit by Email Reply-Chain Cyberattack
Next WIRTE Hacker Group Targets Government, Law, Financial Entities in Middle East

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

22 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

23 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT