Protecting Your Computer
Protection
Changing wireless passwords/SSIDs
Your wireless router needs a password to let you connect your computers, mobile devices and smart devices over Wi-Fi. Routers frequently come with a password that is common to all of the others provided by your ISP. If this is...
Replacing Windows XP
Despite the frequent introduction by Microsoft of newer versions of its Windows operating system over the years, some business and home PC users are still using Windows XP, which was replaced back in 2007. However, Microsoft...
Update Your Browser
Get Safe Online recommends that for optimum safety and security when using the internet, you always run the latest version of your chosen browser that your operating system will support. You should also always download and...
Safe Mac Use
Apple Macs are less vulnerable to attack by malware than PCs. Many people, in fact, believe that Macs are immune to viruses and spyware, but this is definitely not the case. As the use of Macs has increased for both personal...
Software Updates
The software that may be on your computer includes: Microsoft products (either bundled with the Windows operating system or purchased separately) Office (including Word, Excel, PowerPoint, Outlook) Media Player ...
Backups
The information held on your computer may be irreplaceable. Regularly backing up your data will ensure that you have more than one copy....
Windows Updates
When Microsoft launches a new version of Windows, online criminals quickly find vulnerable areas in the operating system and continue to do so for the lifetime of the version. To counter this, Microsoft releases regular updates...
Physical Security
Physical security is just as important as online security in protecting your computer and yourself against crime. This page covers physically protecting your equipment and data not only from theft, but also from fire, flood and...
Firewalls
Because the internet is a public network, any connected computer can find and connect to any other connected computer. A firewall is a barrier between the internet and your own computer or network. Think of it as a highly...
Risks
Viruses & Spyware
A virus is a file written with the sole intention of doing harm, or for criminal activity. There are many types of virus. Viruses and spyware are also known as 'malware'...
Ransomware
Ransomware is a form of malware that gives criminals the ability to lock a computer from a remote location - then displays a pop-up window informing the owner that it will not be unlocked until a sum of money is paid. In some...
Downloading & File Sharing
Downloading content over the internet is a great way to enjoy music, video, games and other entertainment. Downloading is also a very convenient way to obtain information in the form of Word documents, PDFs, photos and other...
Virtual Private Networks (VPNs)
Virtual Private Networks all perform the same basic service: providing end-to-end encryption for any data sent through them. This encryption does not stop your data from being intercepted … but merely means that the person...
Replacing Windows 7
If you still run Microsoft Windows 7 on your computer, you need to be aware that Microsoft ceased support for the operating system on January 14th 2020. As a result, no longer issues updates, security patches, bug fixes and...
Safe Linux Use
This page provides advice on some of the most important activities that are particularly relevant for protecting Linux workstations. It includes advice for people running individual Linux workstations (for example, home or small...
Safe Computer Disposal
Computers that you no longer need should be disposed of with great care. The data on your computer can easily be accessed whether you sell, scrap, give away or donate it, and even ‘deleted’ data can be retrieved with relative...