Protect Your Computer, Protect Your Identity

Posted by Pekin Insurance on Nov 20, 2016

Protecting your computer is one of the major steps in protecting your identity. This article will provide you ways to protect your devices and your networks as well as steps to take if your system becomes compromised. 

computer-4-01.png

Protect Your Devices

Passwords – Password protect all devices. Use strong passwords that contain letters, numbers, and special characters. Avoid using the same password on multiple devices/accounts.

Anti-Virus & Anti-Malware – Installing and regularly updating adequate security software on all electronic devices is a must. Review online references such as www.cnet.comor www.pcmag.com for detailed reviews of the most recent software packages available.

Keep Your Browsers Up to Date – Internet browser sites regularly release new versions in order to enhance the user experience and to combat known security threats. When you browse the web, you are susceptible to malware, viruses, phishing sites, etc. Always update your browser when a new version becomes available to prevent your system, and your personal information, from becoming compromised.

Backup – Regularly backup sensitive information on an external drive. Store the external drive in a safe place so that if your device is compromised, you will still have access to your files.

Power Down – Be sure to power down your computer when not in use. When a computer is completely powered off, it is not accessible or susceptible to attacks or intrusions from the Internet.

Remove All Storage Before Disposal – Before disposing of any device, remove all storage drives. Do not rely on the “delete” function to remove files containing sensitive information. The storage drives should be destroyed or you should contact a reputable data destruction organization.

Protect Your Networks

Firewall – Make sure you have a firewall enabled. This will help prevent intruders from entering your system without authorization.

Encryption – Always use encryption, Wi-Fi Protected Access (WPA), or Wired Equivalent Privacy (WEP) to secure your network. Ensure your wireless router has its encryption feature turned on to prevent unauthorized access to your sensitive information.

Set Wireless to No-Broadcast – The SSID broadcast feature on your wireless network is used for roaming purposes and is therefore virtually unnecessary on your home Wi-Fi network. Disable this feature to improve the security of your personal network.

Public Networks – When using public networks, choose the most secure connection, avoid typing sensitive information, and be sure to disable Wi-Fi access on your device when not in use. Avoid using a public Wi-Fi connection as the information can easily be captured by criminals on the same connection. If possible, avoid acc­­­essing anything sensitive, such as conducting online banking, making purchases, or accessing email accounts. Make sure to use an encrypted Internet connection whenever you go online.

What to Do if Your System Becomes Compromised

Stop Sensitive Activities – Immediately halt all sensitive activity including banking, shopping, accessing email accounts, and anything else that requires the use of a login or password.

Immediately Scan Your System – Scan your computer with your existing security software and remove any items it deems dangerous. If you do not have security software already installed, review online references such as www.cnet.comor www.pcmag.com for detailed reviews of the most recent software packages available.

Monitor for Unusual Behavior – Look for signs of infection, including but not limited to significant decrease in processing speed, repeated “crashes,” difficulty shutting down or restarting, or new icons/toolbars/shortcuts that you have not installed.

Seek Assistance – In more extreme situations where the anti-virus protection does not solve the issue or you cannot access the system at all, you may want to consider additional expert assistance. Some of your options are:

  • Locate an online company that can access, diagnose, and repair a system remotely. Simply type “Online PC Repair” into a web browser to obtain a list of companies to select from.
  • Review the manufacturer’s guide for return or repair instructions. Many companies offer assistance with protecting, disabling, and/or restoring a device once it has been compromised. Begin by contacting the manufacturer (i.e., Apple) or the service provider (i.e., Verizon) for assistance identifying your options.
  • Contact the company where the item was purchased for return/repair assistance.
  • If you decide to use an online resource, have someone come to your home, or take the computer to a third party, you should use a consumer review site like Yahoo Reviews or Yelp.com to help find a trusted organization. Look for organizations that have a larger number of reviews over a significant period of time.

 

Protect Your Personal Information – If you have reason to believe that your personal information, especially your social security number, has been exposed, take immediate action to protect yourself.

At a minimum you should contact one of the three nationwide consumer reporting companies—Equifax, Experian, or TransUnion—to place a 90-day fraud alert on your credit profile. The longer you wait, the more criminals and identity thieves can cause damage.

 

Additional Resources

www.onguardonline.com Federal Trade Commission’s website designed to educate consumers

www.us-cert.gov United States Computer Emergency Readiness Team

www.ic3.gov Internet Crime Complaint Center

www.microsoft.com/security Free resources to protect, update, and fix Microsoft operating systems.

www.apple.com/support Free resources designed for each Apple product offering.

 

If you are a Pekin Insurance insured and wish to proactively manage your identity, call a Pekin Insurance Agent for assistance. For news on the latest privacy and security trends and educational resources to help you better protect your identity, visit http://pekininsurance-idtheft.com/.

  

Subscribe to our Blog