Wednesday, December 17, 2025
booked.net Call us at 613-908-9448
Eco-conscious : Print an issue, plant a tree! 

No products in the cart.

  • About
    • Contributors
    • Disclaimers
    • Terms & Conditions
    • Giving back
    • Mission Statement
    • Past Issues
    • Where to Find
    • Call us at 613-935-3763
The Seeker - Positively Local, Suporting Local
  • Home
  • News
  • Voices
  • More
    • Arts & Entertainment
    • Business & Finances
    • Community & Events
    • Lifestyle & Culture
    • Tech
  • Events
  • Advertise!
    • Online
    • In Print
  • Multimedia
  • Columnists
  • Contact Us
Seeker
No Result
View All Result

Conclusion: Best Practices for Computer Security

Stephen Burke by Stephen Burke
April 13, 2016
in News
Reading Time: 21 mins read
0

billionphotos-643346 (1)If you have been following this series about computer and software security, you’ve learned about ransomware and socially engineered exploits. A healthy dose of paranoia and some common sense can go a long way to keeping your computer secure.  Computer hardware and software companies like Apple, Microsoft, HP, Dell and others are not likely to call you to let you know that there is something wrong with your computer.  Hang up on these posers and don’t click on the false virus alerts.

Try to stay on websites that are known to be safe and secure. Although reputable sites can be hacked, they are also the most likely to be properly safeguarded against being hacked.  Hover your curser over a link before clicking to make sure it refers to the proper destination.  Enable the pop-up blocker in your browser,  disable stored passwords, erase your browsing history after every session online and reduce your browser cache to 50MB   Ensure that your operating system, browser and any other software you use (Adobe Reader, Flash, Java, etc) is either up-to-date or removed, depending on your needs.

You might also like

City of Cornwall Holiday Closures 2025: What’s Open and What’s Not

Local physician Dr. Melissa Yuan-Innes recognized with Medical Post Top Blogger Award

Council Meeting Recap – December 8, 2025

Install some good security software. Ther are several free products available such as  Avast! Free Antivirus, AVG Free Antivirus and Zone Alarm Personal Firewall. Malwarebytes Anti-Malware to remove some infections and CCleaner to help proactively remove potential problems. There are paid programs such as BitDefender Total Security and Kaspersky Total Security; and if you have valuable data paying for one of these programs makes sense. Installing and properly configuring a highly rated computer system security program should help keep your equipment secure.  Do some research and find the best product for your needs.

E-mail security is also important. One way to do that is to have a web-based e-mail provider like Gmail, Hotmail, Yahoo! Mail or a similar service. These large firms have all implemented different types of viruses scanners. The incoming email and outgoing emails are scanned for infections, but typically only check for viruses. 

Regardless of which e-mail client you use (Thunderbird, Windows Live Mail, etc) it is important that the preview mode is turned off. If an e-mail is automatically loaded, there is the odd chance that malicious code can automatically install a virus or other type of malware.  Do not allow for automatic downloading or opening of attachments.  Scan all attachments and don’t open e-mails from people you don’t know. Remember the “I love you” virus?  It spread via e-mail and affected over 45 million computers. It can be considered one of the world’s most dangerous computer related disasters as it cost over 5 billion in damages worldwide.  Set your e-mail client software to its highest security setting and if you have antivirus or system security software, enable any e-mail scanning feature it may have.  Do not open e-mails from people you don’t recognize.  Although your web mail service provider may scan your e-mails for infections, you should also employ tight security processes to ensure that you are not compromised.  Yes, ensure that your e-mail client is up-to-date.

You will also want to ensure that your Internet gateway – either your modem or router – is secure. Go towww.grc.com/shieldsup and run their tests. If you fail the tests, read their explanations.  If you are not comfortable with their suggestions, you can contact your local trusted computer professional and have them help you harden your equipment against being exploited.

Next week: Selecting your next computer.

Stephen Burke

Stephen Burke

Next Post
Alkaline Entertainment powers it up again…

Alkaline Entertainment powers it up again...

Categories

  • Arts & Entertainment (49)
  • Business & Finances (24)
  • Community & Events (97)
  • Health & Wellness (26)
  • Lifestyle & Culture (2,019)
  • News (3,577)
    • Sports (2)
  • Tech (9)
  • This May Also Interest You (898)
  • Voices (289)

Current Contributors

  • Anna Varnava
  • Betty Healey
  • Genevieve Desrochers
  • Geraldine Fitzpatrick Borland
  • Ian Bowering
  • Julia Lucio
  • Kossy Valerie Akaeze
  • Lisa Gray
  • Mai-Liis Renaud
  • Mateo Lucio
  • Saanvi Uniyal
  • Stephen Douris
  • Sean George
  • Sylvie O'Rourke
  • Transition Cornwall
  • Yafa Goawily

Past Contributors

  • Ivan Labelle
  • Jason Setnyk
  • Jason Cardinal
  • John Grow
  • John Lister
  • Louise Mignault
  • Marlene Lister
  • Rose Desnoyers
Facebook Twitter Instagram Youtube TikTok
Don't miss anything!

Get notified of all our new news by ringing the bell at the bottom left corner!

Content Safety

HERO

theseeker.ca

Trustworthy

Approved by Sur.ly

2024
Disclaimers
Stock Photos partially provided by our partner Depositphotos
The Seeker Newspaper is located at 327 Second Street E., Cornwall, ON K6H 1Y8 -- All rights reserved
The Seeker does not accept responsibility for errors, misprints or inaccuracies published within.Please note that the views and opinions expressed in news article are solely those of the authors and do not necessarily reflect the official policy or position of The Seeker. The content provided is for informational purposes only and has been written from the authors’ perspective, aiming to engage and inform readers. The Seeker is committed to presenting a wide range of viewpoints and encourages readers to conduct their own research and exercise critical thinking when considering these opinions in the context of their own perspectives.
ISSN 2562-1750 (Print)

ISSN 2562-1769 (Online)
Accessibility Adjustments

Powered by OneTap

How long do you want to hide the toolbar?
Hide Toolbar Duration
Select your accessibility profile
Vision Impaired Mode
Enhances website's visuals
Seizure Safe Profile
Clear flashes & reduces color
ADHD Friendly Mode
Focused browsing, distraction-free
Blindness Mode
Reduces distractions, improves focus
Epilepsy Safe Mode
Dims colors and stops blinking
Content Modules
Font Size

Default

Line Height

Default

Color Modules
Orientation Modules
No Result
View All Result
  • Home
  • News
  • Voices
  • More
    • Arts & Entertainment
    • Business & Finances
    • Community & Events
    • Lifestyle & Culture
    • Tech
  • Events
  • Advertise!
    • Online
    • In Print
  • Multimedia
  • Columnists
  • Contact Us

© 2023 Reducing our footprint!   For every issue we print, we plant a tree!

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.