{"id":3071,"date":"2013-11-05T10:00:56","date_gmt":"2013-11-05T15:00:56","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=3071"},"modified":"2020-02-26T18:36:34","modified_gmt":"2020-02-26T16:36:34","slug":"6-tips-to-keep-your-home-computer-safe-and-secure","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/6-tips-to-keep-your-home-computer-safe-and-secure\/3071\/","title":{"rendered":"6 Tips to Keep Your Home Computer Safe and Secure"},"content":{"rendered":"<p>The safety and security of your personal computer is almost certainly something you\u2019ve been dealing with for a long time. If you keep your anti-virus software updated and establish <a href=\"https:\/\/www.kaspersky.co.za\/blog\/password-check\/\" target=\"_blank\" rel=\"noopener\">strong passwords<\/a> for your online accounts, changing them on a regular basis, you\u2019ve got all your bases covered. Or, do you? To make your online experience truly secure and keep those identity thieves at bay, read on for some lesser-known tips.<\/p>\n<h2>1. Check Your Firewall<\/h2>\n<p>Checking your firewall sounds complicated, but it really isn\u2019t. If you own a Windows-based system, just go to your control panel and type \u201cfirewall\u201d in the search box. If your firewall is \u201con\u201d or \u201cconnected,\u201d then you\u2019re good to go. If you own a Mac, click the Apple icon on your toolbar, go to \u201csystem preferences,\u201d then \u201csecurity,\u201d then \u201cfirewall.\u201d Making sure you have a firewall in place can go a long way toward keeping criminals out. Make sure that you share some of your folders only on the home network. If you don\u2019t really need your files to be visible to other machines, disable file and media \u00a0sharing completely.<\/p>\n<h2>2. Back Up Your Data<\/h2>\n<p>Backing up your data protects you in the event of a computer crash or electrical outage or surge, like a lightning storm might produce. It also helps if you fall prey to the newer type of <a href=\"https:\/\/www.kaspersky.co.za\/blog\/tag\/ransomware\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a>, which encrypts your sensitive data. You can do your back-up manually by transferring important documents to an external hard drive, or using a service like <a href=\"http:\/\/www.carbonite.com\" target=\"_blank\" rel=\"noopener nofollow\">Carbonite<\/a>. If you don\u2019t have a significant amount of data to store, use a service like <a href=\"https:\/\/www.dropbox.com\" target=\"_blank\" rel=\"noopener nofollow\">Dropbox<\/a>, where you get 2GB of storage for free. <a href=\"https:\/\/www.kaspersky.com\/pure-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky PURE<\/a> has backup functionality as well, including Dropbox integration.<\/p>\n<h2>3. Stay Away From Rogue Websites<\/h2>\n<p>Spotting a rogue website can be difficult, but there are a few things you can do to hone your skills. Look for a green lock in the address bar and the code prefix \u201chttps:\/\/\u201d at the beginning of the URL while visiting banking sites, entering your credit card data or accessing your web mail. Be careful when\u00a0shopping\u00a0at a website that ships items from overseas, and don\u2019t click on links sent to you in email messages, go directly to the website itself instead.<\/p>\n<h2>4. Avoid Deals That Are Too Good to Be True<\/h2>\n<p>If you see a deal for 90% off The Beatles Collection CD, it very well could be a knock off. Even worse, some sites are known to lure customers in with an amazing deal, and once they have your credit card information they\u2019re never to be heard from again \u2013 your identity may be compromised and there\u2019s not even a product to show for it. The simple rule of thumb here is: If it looks to good to be true then it probably is.<\/p>\n<h2>5. Never Divulge Sensitive Information<\/h2>\n<p>No matter what website you\u2019re on be careful of the sensitive information you reveal. Although it\u2019s pretty much common knowledge not to give out your social security number or credit card information unless you trust a website completely, you should be just as careful with your social media profiles as well. Revealing information as innocent as your pet\u2019s name or mother\u2019s maiden name could lead to identity theft, because you probably use the same data as the security question on some other website.<\/p>\n<h2>6. Avoid Opening Unknown Emails<\/h2>\n<p>Never open an email from an unknown or suspicious source, and definitely never open any attachments contained in them. You have to be careful of emails coming from people on your contact list as well, especially if the sender\u2019s account has been hacked. If an email from someone you regularly communicate with has a suspicious link and unusual content, delete it and immediately alert this person that his or her account may have been compromised. This will help you prevent hacking and <a href=\"http:\/\/www.moneycrashers.com\/create-password-prevent-hacking-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing scams<\/a>\u00a0where you may be a target.<\/p>\n<p>A great way to give yourself an overall umbrella of protection is to use <a href=\"https:\/\/www.kaspersky.com\/products\/home\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky products<\/a>. Its Internet security and anti-virus software protects you from malware, spyware, and viruses, and it comes with parental controls as well. Doing some of the legwork on your own certainly helps keep you safe, but use Kaspersky if you want to make sure all your bases are covered.<\/p>\n<p>Do you know of any other ways to protect your personal computer?<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n<p><i>David Bowen is a contributor who writes about technology, online security, and computer maintenance tips.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The safety and security of your personal computer is almost certainly something you\u2019ve been dealing with for a long time. If you keep your anti-virus software updated and establish strong<\/p>\n","protected":false},"author":315,"featured_media":3072,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[453,410],"class_list":{"0":"post-3071","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-computer-protection","9":"tag-online-safety"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/6-tips-to-keep-your-home-computer-safe-and-secure\/3071\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/6-tips-to-keep-your-home-computer-safe-and-secure\/2644\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/6-tips-to-keep-your-home-computer-safe-and-secure\/2533\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/6-tips-to-keep-your-home-computer-safe-and-secure\/2830\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/6-tips-to-keep-your-home-computer-safe-and-secure\/2644\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/6-tips-to-keep-your-home-computer-safe-and-secure\/3071\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/6-tips-to-keep-your-home-computer-safe-and-secure\/1962\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/6-tips-to-keep-your-home-computer-safe-and-secure\/3071\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/computer-protection\/","name":"computer protection"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/3071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/315"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=3071"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/3071\/revisions"}],"predecessor-version":[{"id":25973,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/3071\/revisions\/25973"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/3072"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=3071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=3071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=3071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}