In
today’s digital age, cyber security is as important, if not more so, as actual
security guarding a real piece of company property. However they may differ,
they both have safeguard strategies that need to be implemented to the letter
to be effective.
The
following are some guidelines for use in cyber security:
Up-to-date
anti-virus software
This
is a given: all computers must have anti-virus software. The anti-virus
software is specifically created and designed to protect your computer against
known viruses.
There
is one caveat, however. New viruses are created almost daily. There is a need,
therefore, to update your anti-virus program on a regular basis to recognize
these new variants of viruses.
Like
flu shots, only that they are done more often, these regular updates can help
stop these viruses. These regular updates are antidotes for these man-made
vermin.
Firewalls
Firewalls
are virtual defensive fortifications to protect your computer from the outside
world. They filter unauthorized data from elsewhere, mostly the Internet, while
allowing authorized or ‘good’ data to enter your computer.
All
types of firewalls are available in most computer stores, and some computer
manufacturing companies bundle them together with their computers that you
purchase.
Emails
The
simplest rule is this: if you don't know the person who is sending you an
email, be very careful about opening the email and never open any file attached
to it.
Sometimes,
you may have a vague idea who the sender is, but you should still be careful.
Some
tell-tale signs include unusual hyperlinks and/or urgent messages to open the
attached file. Some of your friends may have been conned and unwittingly
forwarded you a virus-laden email.
When
in doubt, delete. Your friend will understand.
Passwords
Passwords
were created to be your virtual key to computer data. Like real-life keys,
passwords are only as good if they are difficult to ‘duplicate’ or guessed.
Some
of the guidelines are: Don’t share your password, don’t use your same password
in more than one place, and most importantly, create a password that is
difficult to guess.
Here
are some time-tested rules in password-making:
1.)
Passwords should have a minimum of 8 characters, and should be as meaningless
as possible.
2.)
Use all kinds of types possible – lower case, upper case, numbers, symbols,
special characters, etc.
3.)
Change your passwords regularly, every three months, for example.
4.)
Never give out your password to anybody.
Back-up
Data
Experienced
computer users know one primary rule: always back up your data. Small amounts
of data can be stored on disks and on CDs if they are more than the disk can
handle. For computers in a network, the usual backup is through the network
data storage system. The overall idea is that if anything happens to your
primary data, you can always retrieve them from somewhere.
File
sharing
Another
big no-no for experienced computer users is sharing them with strangers. Your
computer operating system may allow file sharing from other computers in your
network or from the Internet. This is one sure way of infecting your computer.
Be sure to turn off and disable file-sharing if it is not needed.
Disconnecting
from the Internet
Cutting
your computer’s connection with the Internet when not in use lessens the
possibility of accessing it. If your computer has no firewall or updated
anti-virus protection, someone could harm it.
Update
security patches
Just
like your anti-virus program, there is a need to regularly update your other
computer programs. Sometimes, bugs are discovered in your regular programs that
can be an entrance to your computer for any malicious person to attack and
infect.
Software
companies create patches for these and post them in their sites. They can be
downloaded and are automatically patched up into your program in question.
Regular
security checkups
Like
a car’s multiple systems, a computer security programs need regular checkups,
too. Sometimes, you may discover that a program is outdated through simple
oversight. Some security settings have
to be adjusted according to your present needs. Twice-a-year evaluation is good
enough.
Security
awareness
Like
preparing for emergencies in real life, it is good policy to make sure that
family members or probably your employees would know what to do during computer
emergencies.
They
must at least be aware of proper computer security practices – how to update
virus protection programs, how to download patches, how to create proper
passwords.
Cyber
security, like any real security, needs everybody’s help for it to succeed and
avert those dreaded computer attacks.
Family
Cyber Security
Keeping
your family safe today takes on another additional front – online or the Net.
The perils that you and your family face whenever anyone is online are just as
dangerous as in real life. There simply is a need for cyber security to
minimize, if not totally deflect, these dangers.
Cyber
security is not just to protect you and your children from online dangers. It
is also to ensure that your computer is safe and secure – from your children.
By following some simple computer practices, these dangers can be
lessened.
The
usual safeguards may not be adequate. Children, by nature, are curious and
inquisitive. They like to pry things, satisfy their natural need to know.
As
parents, there is a delicate balance on how long the lease we give out to kids
to satisfy their natural need and the necessity to protect themselves from the
outside world and from themselves.
A
child out into the Net, either playing a game, researching materials for
homework or a term paper can be potentially harmed. Common accidents would be
your child stumbling into a porn site, getting into malicious web pages that
infect your computer, or inadvertently erasing your own computer’s files.
Mistakes
like these happen and your child may not be aware of them. Or if they are, they
may not inform you what happened for fear of punishment.
Another
fearsome threat is the ‘online predator’. Because of the Internet’s natural
cover for anonymity, these people deceive and manipulate other online users to
get what they want. Adults are common victims of these people, and it follows
that children are even more susceptible to their dangerous manipulative
schemes.
The
following are some suggested safeguards in implementing cyber security in the
family.
Be
involved with your children’s activities
There
are some activities you can do with your kids that will in effect allow you to
supervise their activities. If this is not possible, you can always monitor
their computer use – which sites they visit, the activities they do online,
etc. If they are using emails and chat rooms, try to follow who they are
corresponding with, and whether they actually know them.
Rules
and danger warnings
The
children should be made aware about online dangers. They must be able to
recognize suspicious behavior or activities from the Net.
This
will help you set out boundaries on their computer use. Everything, of course,
should be appropriate for their age, knowledge and level of maturity. It is not
correct to scare them, but to make them be alert and aware. This includes sites
they are allowed to visit, programs they can use, and activities they can do.
Separate
accounts and other controls
Today’s
operating systems already carries the option of creating different user
accounts on one computer. You can create separate accounts for them to protect
your own files and data from accidentally accessed, modified, or – horrors! –
deleted.
If
you don’t have separate accounts, consider limiting the functionality of your
browser (like remembering passwords, other information, etc.) to preclude
accidental access.
It
is here that it is important to keep your anti-virus utility, firewalls, and
other safeguards up to date and active.
Some
browsers allow you to restrict viewing certain web sites and protect these
settings with a password. (Click Tools, select Internet Options, choose the
Content tab; click Enable under Content Advisor, etc.)
Some
service providers also offer services that protect children who go online. They
can help filter and block sites that are not suited to children. The Internet
is also full of special programs for children’s protection. Check those that
suits your needs best.
Open
communications and computers
Set
your computer in an open area of the house where everyone can monitor anyone’s
computer activities. It can deter children from doing things not allowed.
Most
important, communication lines between all members of the family should be kept
open. The children must know that they can approach their parents at anytime
about anything they see on the computer.
This
is very important, not just for cyber security, but also for the family’s
well-being as a whole, whether anybody is online or not.
Cyber
Security for Kids
If
you think your kids now just need to be protected from strangers offering them
candy or from cars while crossing the streets, then you have another thing
coming. Your children need a whole new level of protection especially in this
age of computers and the internet. More and more kids are having easier access
to the internet. According to some studies, more than 80% of teenagers in the
US have access to the internet at home. The parents should take an active role
in teaching their children proper cyber security measures.
Most
of the time kids who access the net are not careful enough when giving out
personal information online. They don’t realize yet the risks of not having
confidential and personal information protected online. From virus, to hackers,
to identity thieves, these people are lurking in cyberspace waiting for that
opportunity. I can only stress the importance of cyber security for kids.
Now
there are several ways where you can help instill to your children the proper
ways of accessing, behaving and protecting themselves online. One of the more
common venues where your children go on the web is the social network sites
where they have online profiles, photos and keep blogs or online journals.
Remind your kids that not to accept all those you invite them to be their
online friend especially if they don’t know that person.
The
problem with these social network sites is that once you add someone as a
friend, you can be viewed by friends included in his own network which most of
time you don’t even know. These are venues where scrupulous individuals can
gain access to your personals.
To
monitor their browsing activities or encourage them to ask questions, place
your computer in an area of the house where there’s heavy foot traffic. This
will make it easy for them to call your attention to their monitor if they want
to ask questions or show you something. This also discourages them from
visiting lewd and pornographic websites.
These
websites are not only inappropriate but are also a repository of malware,
spyware and virus applications that can destroy files and even your whole
computer system. In this regard, it would be best to use controlling mechanisms
like content blockers which prohibits them to access certain websites and also
monitoring application so you can take a look later what they actually look for
in the net.
It
is always good to engage your children in a healthy conversation about the
things that did or things they can do online. This way you can teach them proper
ways or help develop good habits that will ensure their safety online. You can
also teach them the pros and cons of social networking, online file sharing,
and even the issues of software piracy and illegal downloads. These are part of
increasing their knowledge and understanding about the technology of computers
and the net as well as cyber security.
You
should always remember that children’s predisposition of being still curious,
innocent, and sometimes their desire to be independent can cause them to be
careless. That is why ordinary safeguards are not enough when it comes to
protection your kids on cyberspace. The previously mentioned cyber security
measures for kids are not just an introduction.
You
will have to know for a fact your kids computer habits and then learn how you
can better protect them.
No comments:
Post a Comment