Your online security depends much upon the security of your computer, mobile device or tablet. Follow two simple steps to protect them:
- Keep your software up-to-date to ward off online threats
Keeping your software up-to-date will often remove the vulnerabilities that virus and other malware are known to attack. Most computer operating systems have settings for automatic updates that will make sure your software is capable of meeting current and known cyber threats.
Apple Computer pushes out updates through the Software Update function in Mac OSX and also posts updates on its Support Downloads page. Microsoft Windows users can check to see if they are up-to-date and verify their security software at their Safety & Security Center.
And the updates are needed for more than your operating system and virus software. Other programs such as Java, Acrobat, Microsoft Office, and Quicken will also need to be kept up-to-date. Most of these applications will remind you from time to time to download and install current versions.
Sometimes online games and social media that you (or others such as children or grandchildren) are using on your computer can cause trouble. So make sure that you run a virus or malware scan of your entire hard drive periodically ensuring you (or some other user) didn’t inadvertently lay the welcome mat out for an intruder.
- Keep your computer safe from prying eyes.
No firewall and virus software can defend against theft of, or physical access to, your computer or mobile device. Take reasonable precautions against physical access of your computer by requiring a password to log on to the connected device, and require that password to get past the screen saver. A password to begin or awaken a computer or mobile device can be just enough to discourage would-be intruders.
Software updates and prudent physical security are very important to your online safety. But they aren’t the only factors. Find out more on our website. Check out How to Protect Your Identity on TheRealPeoplesBank.com. Or click here to read more from our series of online security blog posts.