iTecs IT Outsourcing and Support Blog
Most of us have been tempted to venture in some corner of the Internet that could be considered high-risk for one reason or another. Maybe you were looking for lyrics for a song or subtitles for a movie you downloaded. Either way, when you venture outside the bubble of popular websites, you put your computer and your data at risk.
Protection for your computer is like an onion, with various layers of protecting solutions safeguarding your system.
While this layer of protection is standard, it's never the end all be all. A lot of viruses can bypass even the best-rated AV scanners on the market today. If your computer was the core of the onion, this is the very thin layer covering it, and as the skin on your body, it can be very porous.
There are numerous others however for this article I'll cover the basic and most accessible to the average user. You can install a firewall/router that has built-in security services like the Dell SonicWall. A firewall/router that scans inbound and outbound network traffic for malicious code is a decent layer of protection since it can stop a virus from ever reaching your computer. But even this solution can't be 100% effective all the time, and these units can be costly and slow your Internet browsing speeds.
Another layer you could add to help safeguard your computer is to use a second browser that is configured only to read the underlying HTML code of a website and never executes JAVA, Flash or accepts cookies. For example, if you use Chrome as your primary browser, you could setup Internet Explorer to be as restrictive as possible by disabling JAVA, Flash, accepting cookies and even processing images the website presents. If you are unsure that a site you want to visit is 100% safe, use your locked-down Internet Explorer to view it.
Yes, there is, and it's free! It's called Oracle Virtual Box (https://www.virtualbox.org/) and like VMWare Workstation, you can launch a virtual machine from your desktop computer and use it to visit possibly unsafe websites. If your virtual machine becomes infected, delete it and run a new VM.
You can go a step further and make sure that your local host and other networked computers have rules in their firewalls blocking the network traffic generated by your virtual machine.
After what seems like a lifetime of technology exposure, I still become saddened but not surprised when I hear about someone falling victim to a phishing attack. Most medium to large businesses, if not all, have invested heavily in employee awareness training as a means to improve their cybersecurity posture.
Read MoreiTecs enters into a partnership with Check Point, a leader in enterprise and SMB cybersecurity products and solutions, to provide iTecs clients with efficacious cybersecurity protection. The collaboration between the two parties enables iTecs to deliver the various services and products to clients as a managed service.
Read MoreMitigate the chances that your crypto exchange accounts get hacked by following the tips below.You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.
Read More