Many offices and individuals still prefer computer to handheld devices.
However, viruses and hackers wreak havoc more on computer than they do on other devices, experts have said. So when your computer is not fortified against hacking, you may lose vital documents and information in a jiffy.
Hacking occurs when your computer is infiltrated and your personal information stolen from it, or you are tricked into revealing private data – using that data to steal and extort personal information – such as business secrets, bank account credentials and even people’s identities.
Who are computer hackers?
Computer hackers are people who break into internet-connected devices such as computer and mobile phones to steal vital information.
Just as physical thieves have malicious intent, hackers usually find their way into devices for negative purposes. Except white hackers or ethical hackers who are usually hired by companies to break into their devices to find security flaws that need to be fixed, hackers generally are fraudsters.
Hackers may want to steal, alter or delete information in your devices, and they often do so by installing malware (software used for malicious purposes) you might not even know is there. These thieves may get access to your most precious data before you are aware of a break-in.
Therefore, we need to know the reasons computer hackers break into devices so as to protect our devices:
Financial crime: The usual story of somebody checking their credit card statement, only to find transactions they did not make is common. These fraudulent transactions are made by computer hackers who steal credit card numbers and other financial data to perpetrate financial crime.
Vandalism: Some hackers vandalise websites just to show off to other hackers or to take revenge.
Hacktivism: This is internet-based activism. Some hackers alter or destroy certain websites for political reasons.
Espionage: Spying existed long before the internet era, and hacking has only made it more accessible to people. With much of the world constantly connected to the internet, one company can hack into other companies’ devices to steal their information and use them to build an unfair competitive advantage. Likewise, a country can do it to another. The case of Russia during the 2016 presidential election is an example.
How to secure your computer
Despite the prevalence of hackers, most businesses rely on the internet to track their financials, order and maintain inventory, conduct marketing and PR campaigns, connect with customers, engage in social media and perform other critical operations. Yet we continue to hear about massive computer breaches, even at giant corporations with robust security measures in place.
Small businesses are often targets as well, especially because they may underestimate the risk of cybercrime and may not have the resources to employ expensive cybersecurity solutions.
Follow these tips to protect your computer and safeguard your sensitive data:
Use a firewall
Make sure your computer firewall is enabled before you go online. You can also purchase a hardware firewall from companies such as Cisco, Sophos or Fortinet, depending on your broadband router, which also has a built-in firewall that protects your network. If you have a larger business, you can purchase an additional business networking firewall.
Install antivirus
Computer viruses and malware are everywhere. Antivirus programmes such as Bitdefender, Panda Free Antivirus, Malwarebytes and Avast protect your computer against unauthorised code or software that may threaten your operating system. Viruses may have easy-to-spot effects – for example, they may slow your computer or delete key files.
Antivirus software plays a major role in protecting your system by detecting real-time threats to ensure your data is safe. Some advanced antivirus programs provide automatic updates, further protecting your machine from the new viruses that emerge every day. After you install an antivirus program, do not forget to use it. Run or schedule regular virus scans to keep your computer virus-free.
Install an anti-spyware package
Spyware is a special kind of software that secretly monitors and collects personal or organisational information. It is designed to be hard to detect and difficult to remove and tends to deliver unwanted ads or search results that are intended to direct you to certain (often malicious) websites.
Some spyware records every keystroke to gain access to passwords and other financial information. Anti-spyware concentrates exclusively on this threat, but it is often included in major antivirus packages, like those from Webroot, McAfee and Norton. Anti-spyware packages provide real-time protection by scanning all incoming information and blocking threats.
Use complex passwords
Using secure passwords is the most important way to prevent network intrusion. The more secure your passwords are, the harder it is for a hacker to invade your system. More secure often means longer and more complex.
Use a password that has at least eight characters and a combination of numbers, uppercase and lowercase letters, and computer symbols. Hackers have an arsenal of tools to break short, easy passwords in minutes.
Do not use recognisable words or combinations that represent birthdays or other information that can be connected to you. Do not reuse passwords. If you have too many passwords to remember, consider using a password manager such as Dashlane, Sticky Password, LastPass or Password Boss.
Keep your OS, apps and browser up to date
Always install new updates to your operating systems. Most updates include security fixes that prevent hackers from accessing and exploiting your data. The same goes for apps. Today’s web browsers are increasingly sophisticated, especially in privacy and security. Be sure to review your browser security settings in addition to installing all new updates. For example, you can use your browser to prevent websites from tracking your movements, which increases your online privacy. Or, use one of these private web browsers.
Beware of spam
Beware of email messages from unknown parties, and never click on links or open attachments that accompany them. Inbox spam filters have gotten pretty good at catching the most conspicuous spam. But more sophisticated phishing emails that mimic your friends, associates and trusted businesses (like your bank) have become common, so keep your eyes open for anything that looks or sounds suspicious.
Back up your computer
If your business is not already backing up your hard drive, you should begin doing so immediately. Backing up your information is critical in case hackers do succeed in getting through and trashing your system.
Always be sure you can rebuild as quickly as possible after suffering any data breach or loss. Backup utilities built into macOS (Time Machine) and Windows (File History) are good places to start. An external backup hard drive can also provide enough space for these utilities to operate properly.
Shut it down
Many businesses, especially those operating a web server, are “all systems go” all the time. If you’re not operating a complex internet-based company, however, switch off your machine overnight or during long stretches when you’re not working. Always being on makes your computer a more visible and available target for hackers; shutting down breaks the connection a hacker may have established with your network and disrupts any possible mischief.
Use virtualisation
Not everyone needs to take this route, but if you visit sketchy websites, expect to be bombarded with spyware and viruses. While the best way to avoid browser-derived intrusions is to steer clear of unsafe sites, virtualisation allows you to run your browser in a virtual environment, like Parallels or VMware Fusion, that sidesteps your operating system to keep it safer.
Secure your network
Routers don’t usually come with the highest security settings enabled. When setting up your network, log in to the router, and set a password using a secure, encrypted setup. This prevents intruders from infiltrating your network and messing with your settings.
Use two-factor authentication
Passwords are the first line of defense against computer hackers, but a second layer boosts protection. Many sites let you enable two-factor authentication, which boosts security because it requires you to type in a numerical code – sent to your phone or email address – in addition to your password when logging in.
Use encryption
Encryption can prevent cybercriminals from accessing your information even if they gain access into your network and files. You can encrypt your Windows or macOS hard drive with BitLocker (Windows) or FileVault (Mac), encrypt any USB flash drive that contains sensitive information and use a VPN to encrypt web traffic. Only shop at encrypted websites; you can spot them immediately by the “https” in the address bar, accompanied by a closed-padlock icon.