|

10 points to use your computer safely

It introduces important points regarding PC safety measures, such as points for using a PC safely, antivirus measures, passwords, and the importance of backups. By practicing these contents, you can use your computer more safely. This page provides basic information on how to use your computer safely.

1. Importance of password setting

The importance of setting a password on your computer

Passwords play a very important role in protecting computer information. It is dangerous if the PC can be used immediately without setting a password (empty). Setting a password increases the probability of preventing unauthorized access through the Internet from leaking important stored data or hacking such as installing a virus. Also, the longer and more complex the password, the more secure it is. It is recommended to set a password that is alphanumeric and contains upper and lower case letters. 

Precautions when setting passwords for Internet services

Be careful not to use the same password for multiple Internet services such as SNS and shopping sites.
Example:
Many Internet services offer functions that allow users to easily log in with accounts such as Google and Twitter.

  • Log in to Internet service “A” with the account of another Internet service “B” that has already been created.
  • Set the password of net service “A” to the same password as another net service “B” used for login.
  • Account information was leaked due to issues such as the weakness of Internet service “A”.
  • Of course, the user ID of network service “A” is the mail address of network service “B”, so the network service “B” is illegally accessed.
  • As a result of unauthorized access to Internet service “B”, the account itself is hijacked.
  • In the worst case, a brute-force attempt to log in to a network service, and if you use the service with the same e-mail address and password, you will be illegally accessed to those network services.

As you can see from this example, it is very dangerous to reuse one password, so if you don’t have two-factor authentication or you don’t enable it, please set a new password.

Improved password security

Changing your password regularly makes it even more secure. Also, if you are worried about managing a lot of different passwords, using a password management tool is one way.

2. Antivirus software

Introduction of anti-virus software

With Windows 10/11, the antivirus software ” Windows Defender ” is installed as standard, and there is no problem with a normal PC. However, it is necessary to consider the introduction of paid anti-virus software for personal computers that handle important documents, even for companies or individuals. 

virus infection

Antivirus software is an important piece of software that protects your computer from viruses. If you are infected with a virus, there is a risk of destroying data in your computer, stealing information, or becoming a perpetrator of an automatic attack from your computer. Among viruses, if infected with “ransomware”, all files with access permissions (including NAS and shared) will be encrypted, and there are also super malicious ones that require payment to restore. 

Security of anti-virus software

Most antivirus software is updated automatically, but you can ensure even greater safety by checking the update status from time to time and always keeping it up to date. 

Antivirus software update check

  • Windows 10 “Update & Security” in Settings
  • Windows 11 “Windows Update” in the settings

You can check by clicking “Check for Updates” from

3. Firewall settings

Firewall function

A firewall is a function that monitors and guards against unauthorized access and attacks caused by communications on the Internet and networks. Windows comes standard with a firewall. 

Firewall role

A firewall serves to protect against unauthorized access from the network. It plays a role in protecting against attacks that invade computers from the Internet and dangers caused by Internet connections such as controlling access to malicious websites on the Internet from computers. 

Firewall settings

Windows firewall settings can be configured from the Control Panel.

  • Enter “control” in the search for taskbar functions
  • Click “Control Panel” in the search results to open
  • Click “System and Security”
  • Click “Windows Firewall”
  • Check whether the firewall is enabled/disabled, and if it is disabled, enable it.

There are two main types of firewall settings: “Private” and “Public”.

  • private firewall

    This setting is for use in a network environment with internal communication only, such as within a home or company LAN.

  • public network firewall

    This setting is for use in a network environment used by an unspecified number of people, such as Wi-Fi outside or at an Internet cafe.

Both Windows 10/11 have the same firewall settings .

4. OS and application updates

Importance of updates

There are critical updates that fix security vulnerability issues caused by OS (Windows or Mac) or app glitches. In addition, program bug fixes and new features are added. That’s why it’s important to check for updates regularly, especially if it’s not auto-updated, and run updates, especially when it comes to security. 

Checking for and running updates

Important updates are usually updated automatically, but checking for updates from time to time is also a safety measure when using your computer. 

  • Windows 10 “Update & Security” in Settings
  • Windows 11 “Windows Update” in the settings

You can check by clicking “Check for Updates” from Make sure your computer is up-to-date to make your computer more secure

5. Importance of backup

Safeguard with backup

Backups are a very important part of computer security. Since SSD and HDD disks cannot be used forever and can be destroyed at any time, the data stored on the computer may be lost. Therefore, it is important to back up important files and data. 

Backup storage location

Backups can be manually copied and pasted to another disk drive on your computer, an external disk drive, or a network drive using the backup app. If you use cloud service storage, you can synchronize or manually back up, but if you exceed the capacity limit, you will need to charge. 

Run a backup

Windows has a “system restore” function that allows you to automatically back up your system. However, files cannot be backed up. When backing up files, you can use the function that automatically backs up files (folders) at a set time. In the case of Mac, there is a convenient function that allows you to back up the whole thing with Time Machine. 

Windows backup settings

■ Automatic backup of Windows systems

The “System Restore” feature is not enabled on most PCs. Once enabled, a system part of Windows will be backed up automatically. The simple act of restoring from a backup to a previous date when things were working fine is likely to fix even the toughest Windows glitches.

■ Automatic backup of Windows files
  • Connect a disk drive to store backups
  • Enter “control” in the search for taskbar functions
  • Click “Control Panel” in the search results to open
  • Under System and Security, click Save backup copies of your files with File History.
  • Click the “Turn On” button in the File History settings
  • Set the backup folder and backup interval in the setting items on the left

Mac backup settings

  • Open System Preferences
  • Click “Time Machine”
  • Connect a disk drive to store backups
  • Click “Select Disk”
  • Put a check mark in “Automatically create backups” and set it to “Enable”

6. Notes on PC sharing

Risks of sharing a computer

If you share your computer with multiple people other than your own, unintended settings may lead to information leaks and security risks. 

PC sharing risk avoidance

  • Create shared-only user accounts

    When sharing a computer with multiple people, create a separate user for shared use instead of this user, and share the created user account. This allows the user’s data and settings to be separated and reduces the risk of information leakage.

  • set password

    When sharing a computer with multiple people, it is important to enable passwords for shared user accounts in the sharing settings. Regularly changing your password is an additional layer of security.

  • Pay attention to shared folder settings

    When setting up shared folders, it is important to keep the sharing settings to the bare minimum. Also, make sure that the files and folders you share do not contain sensitive information.

7. Browser settings

Browser safety measures

A browser is an important app for browsing the Internet. Depending on the initial value settings, security problems may occur, so you can take safety measures by reviewing the settings. 

A note about browser settings

  • Enable your browser’s auto-update setting

    By enabling the browser’s automatic update function, if a vulnerability in the browser is discovered, a patch will be applied, and it will be possible to defend against attacks that exploit the discovered vulnerability.

  • Limit cookies

    At the request of a website, the browser saves what can be acquired, such as viewing history, in a file called a cookie. Another security measure for your browser is to set a cookie limit in your browser settings to prevent cookies from malicious websites.

  • Don’t install unnecessary addons

    Browsers come with a variety of add-ons from third parties that may be useful to you. However, if vulnerabilities occur in these add-ons, we have no choice but to wait for the offer from the add-on publisher. Don’t install add-ons you don’t need or add-ons you don’t trust.

8. Beware of suspicious sites

The danger of suspicious sites

If you access a suspicious site, you may be infected with malware such as viruses and spyware, or your personal information may be stolen by a fake website impersonating you. 

Be careful about accessing suspicious sites

  • Sites that look the same but are a little weird

    If you visit such websites, you may be phishing, so be careful not to enter the requested information or accept any written invitations . Use a reliable search engine to find the site you want and then visit again.

  • Displaying pop-ups (dialogs)

    Sites with repeated pop-ups may contain dangerous viruses or spyware, so close the browser itself or click the “X” icon if it closes.

  • download link

    If you casually click on suspicious download links, you may end up downloading dangerous programs. Please do not click on it even if you have downloaded it. In any case, be careful not to click on download links that look suspicious.

9. Beware of Suspicious Emails and Spam

Danger of Spam

Spam emails are unsolicited emails sent to an unspecified number of people. Spam emails contain a lot of malware and viruses. In addition, there are “phishing (spoofing) scams” that deceive users of passwords, credit card information, etc. by luring them to a site with content that seems to be suspicious, such as suspicious access from the outside from a bank or shopping site. Very dangerous. This is the same as the “suspicious site” above. 

Beware of spam emails

If you receive a spam email, it is a good idea to delete it without opening it, but there are some parts that are difficult to judge. 

If you open a suspicious email

  • Never click on “links” or “buttons” in the text . Even if the bank name and site name you are using are the same, please read the contents carefully. You will always find something you don’t understand.
  • Do not open full if there are attachments

10. Beware of Suspicious Files

Danger of suspicious files

If you suddenly find a file or compressed file with an unfamiliar name, it may have been downloaded from a website or email without your knowledge. Or it can be intentionally created when you install it, such as a malicious free app. Especially if there are unfamiliar suspicious files in Documents, Downloads, Pictures folders, etc., the possibility of viruses, malware, spyware, and other malicious programs and documents cannot be denied. 

What to do with suspicious files

If your anti-virus software is up-to-date and working properly, it will process it when you open a file or decompress a compressed file. However, it is not processed with 100% probability. First, make sure your antivirus software is working properly. If it seems to be working properly, look at the creation date of the file and remember what you did at that time before deciding whether to run it. If the file is no longer needed, the best solution is to delete it.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *