Your Internet Use: Safe or Risky?

2 DiceWhen asked “how much Internet security do I need for my computer?” I usually respond with “that depends what you use it for and how safely or risky you use it.”

For example, if one uses a computer and the Internet for only creating documents and using email; that use would be categorized as one of less risk. On the other hand, if one uses the computer to indiscriminately surf the Internet, or even surfing large numbers of sites on a regular basis; that use would be categorized as high risk.

Additionally, I define risky use of an Internet-connected computer as including the following unsafe habits:

  • Use of weak passwords or ones containing personal information, dictionary words, or proper names, etc., which are easily guessed.
  • Use of email in an unsafe manner by opening unsolicited emails and clicking on their links. Phishing attacks usually come in the form of unsolicited emails urging you to click on a link;
  • Visiting unsafe Internet websites such as those of celebrities, pornographic sites, and any unknown site whose link resides in an email or social networking service such as Facebook, Twitter, LinkedIn, or MySpace. Many of the above sites can contain malicious code which will inject malware onto your computer.
  • Placing general trust in emails, websites, and social networking sites. Instead one should have a healthy sense of distrust, suspicion, even mild fear when using the Internet.

Everyone who uses the Internet needs a minimum of a good anti-virus system, and firewall. From there an Internet user could also add additional layers of security based on how safely or risky they use the computer and Internet.

Additional layers include:

The physical use of the computer. For example, not letting anyone else use your computer; and having an “isolated” computer that you use only for online financial transactions such as banking transactions or paying bills online (and not for surfing the web). The objective with physically isolating your computer(s) is to avoid having other people use your computer in a risky manner, thus avoiding malware infection as result of their use.

An additional layer might be using virtual partitions or “sandboxing while surfing the Internet. This layer protects your computer from damaging infection if you should get malware onboard.

The proper use of passwords, such as using strong passwords and not using the same one on more that one account will help avoid compromise of your computer or Internet account.

So you see, it does depend on how safely or risky you use the computer and the Internet. But just to be on the safe side; set up strong, layered security protection even if you’re categorized as a less risky user. It can’t hurt…and it may save you from being infected with malware and suffering the losses usually associated with a malware attack.

Be very careful…it’s dangerous out there.

Please comment on this article; we all learn from each other when our views and opinions are shared.

I hope you enjoyed this article. If you enter your email address in the Email Subscriptions box on the right column of this page, I’ll send you an email when a new article is posted. I don’t share your email address with anyone…no one; I hate spam too. Please share my site with your friends and family. Thanks.

Remember, personal computing is a blast…keep it productive and enjoyable.

Best regards,

Paul

paulsinternetsecurity(at)yahoo.com

I’m also on Twitter, @PaulsInternet.

Images courtesy of FreeDigitalPhotos.net and FreeByte.com

Advertisements

Leave a comment

Filed under Facebook, Internet Security, malware, passwords, Social Networking, Warning

What do you think?

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s