COMPUTER SECURITY FOR SMES: FREE TOOLS TO PROTECT YOUR WEBSITE
Home/vpn privacy / COMPUTER SECURITY FOR SMES: FREE TOOLS TO PROTECT YOUR WEBSITE
COMPUTER SECURITY FOR SMES: FREE TOOLS TO PROTECT YOUR WEBSITE

Every day new threats or viruses are known that endanger your safe Internet browsing. The solution, in most cases, depends on you and the correct use of new technologies. On International Information Security Day, learn how to protect yourself on the Internet with our guide on Computer Security. Win in peace of mind.

Definition of computer security and classification

When we talk about computer security, we are referring to the set of measures that we must adopt to guarantee safe browsing on the Internet and, in this way, avoid threats that could affect and infect our computer or mobile devices.

Information technologies have changed the way we relate to the world. The massive use of email, social networks, electronic commerce, the download of mobile applications, online games or instant messaging systems (Whatsapp, Telegram …) have brought with them an increase in the dangers on the Internet and the need to be more vigilant than ever with our computer security.

The data from the latest report on Cybersecurity and trust in Spanish homes of the National Observatory of Telecommunications and Information Society (ONTSI) leave no room for doubt. 70.4% of Internet users surveyed acknowledge having suffered an incident related to computer security on their computer, which is mainly summarized in spam (88%), viruses (26%) or cyber attacks on their accounts and passwords (11%) .70.4% of Internet users acknowledge having suffered an attack on their #InformationSecurityCLICK TO TWEET

A relevant fact of this study is that of those affected , 53% had not realized that their computers were infected and that leads us directly to the question, what computer security measures can you apply to avoid threats that affect your safe browsing on the internet? According to ONTSI, we can summarize them in:

Passive computer security measures

They are those aimed at preventing Internet security threats and can be summed up with the saying: prevention is better than cure. We can divide them into automatable (do not require user action) and non-automatable, and are classified into:

  1. Firewalls.
  2. Passwords
  3. Backups.
  4. Digital certificates.
  5. Document and folder encryption.
  6. Electronic ID.

Active computer security measures

They are those that we take once we suffer an incident related to the computer security of our data or equipment, and they can also be classified as automatable and non-automatable. They are classified into:

  1. Plugins for the computer.
  2. Pop-up blocking.
  3. Deletion of temporary files.
  4. Anti-spam and anti-fraud programs.

At an intermediate level we can find some computer security measures that combine both options (active and passive security) such as the installation of antivirus programs and updates to the operating system that will always ensure safer Internet browsing.69.4% of Andalusians acknowledge that they provided personal data through the #InternetCLICK TO TWEET

Main indicators of computer security in Andalusia

What is the level of cybersecurity of Andalusians? Do they use ICT responsibly? What are the main threats they detect and what means do they use to solve the security incidents they suffer on the Internet? The ICT study of the National Statistics Institute informs us of all this, which, in the case of Andalusia, draws these conclusions:

  1. 60.4% of Andalusians indicated that they have “quite a” degree of digital confidence, 10.3% indicated that they have “a lot” and 29.2% that they have “little or nothing”.
  2. 69.4% of Andalusians acknowledge that they have provided personal data through the Internet.
  3. 66.9% indicate that they took actions to manage their privacy and access to their personal data. Among these, checking that the site they are accessing is safe (45.8%), limiting access to their profile on social networks (43.1%) or denying permissions to use their information for advertising purposes (42.3 %).
  4. 45.3% show some type of concern about the possibility that their Internet activity could be monitored or tracked. This situation is of great concern to 14.5% and nothing to 40.3% of those surveyed.
  5. 75% of Andalusians indicate that they use some type of security program or software, although only 14.2% use any device to avoid tracking their Internet browsing.

Top computer security threats

Every day you hear about them. New threats to computer security emerge every day. Protecting yourself from them depends, to a large extent, on the responsible use by Internet users who have the first step in their hands to guarantee secure Internet access. Protect yourself from these computer security threats and keep in mind that, if you suffer them, we are being the victim of a computer crime that you can report:

  • VirusWe all know what we are talking about when we mention the term computer virus . We refer to malicious software that installs and infects our computer or mobile device, and that can spread to others. Malware is still very present on the Internet, where new virus alerts are announced every day.
  • SpamAlso known as junk mail or junk messages. Spam reaches your email inbox and usually contains a malicious file (malware) that when activated activates a Trojan that can take control or damage your computer. The main danger of spam is that it copies and spreads to your entire contact list.
  • PhishingThe definition of phishing is closely linked to online banking systems and payments over the Internet. Phishing has become one of the main threats to the computer security of millions of users and entities. Phishing impersonates the identity of an entity or company to fraudulently obtain the user’s personal data (passwords or bank access data).
  • RansomwareUndoubtedly one of the threats to computer security that most worries today. The definition of ransomware has to do with the terms (ransom ‘ransom’ in English and ware, referring to software) and refers to malicious software that runs on your computer and encrypts access to your files demanding a ransom for its release .
  • KeyloggersThe term keylogger refers to a malicious application that, once downloaded to our computer (usually arrives through a spam email), runs in the background and copies all of our keystrokes to a txt file. In this way we are providing all our passwords and security codes to cyber criminals.
  • SpywareAlso called spyware. It is another variety of malicious software that, after being installed on our computer, poses a threat to our computer security because it spies on and shares our security keys remotely. Currently, it is very present in the form of an APP that, after downloading to our mobile phone, takes control and copies all of our contacts and personal data. In traditional computer equipment (PC) it can be installed through the webcam or the microphone. Be careful: cover your webcam and deactivate the microphone if you are not using them.

Protecting yourself from threats and viruses largely depends on your #Internet behaviorCLICK TO TWEET

8 essential measures for your computer security

To avoid these threats and ensure safe browsing on the Internet, there are several basic computer security measures that can prevent problems on the Internet. Putting them into operation means guaranteeing the privacy of our data and promoting a greater degree of digital trust. Take note:

  • PasswordsThey are the gateway to our email, social media profile and other online services that we use in our daily lives on the Internet. Remember: Always use long passwords (minimum of eight characters) that combine letters, numbers and special characters (_, &, -), and change them from time to time. Never use the same passwords for different profiles and email accounts.
  • Two-step verificationIncreasingly used by large email platforms, social networks or messaging services such as Whatsapp. It consists of the use of a second security code, which is normally sent via SMS and which increases the security of our data and personal information. Do you know how to activate two-step verification in your Google account?
  • Beware of public WIFI networksIf you are going to use a public WIFI network (which you access in cafes, hotels or other places) it is better to avoid online purchases and access to services that require entering a password. Avoid any type of personal data because it can be collected by outsiders.
  • Configure the security of your routerAs with passwords, you must regularly change the access data to your router to prevent access by other people. The passwords for the password are the same as the ones we have seen previously.
  • Updated operating systemAny expert in computer security will confirm that it is an indispensable measure to avoid threats on the Internet. If your software is not up-to-date, you are leaving the door open for malware that, be clear, is updated and renewed every day to infect your computer.
  • Antivirus installedIn order to guarantee safe browsing on the Internet and to avoid threats that affect your computer security, it is essential that you have an antivirus program and that it is always updated. You can find free references in a section of this post.
  • Check privacy on Social NetworksIf you have a profile on Facebook, Twitter, Instagram or any other social network, take a few minutes to review the privacy options to decide what is visible and what is not. Keep in mind that many of these options are configured by default and that, especially in the case of minors, it is convenient to restrict them to the maximum.
  • Online shopping on secure platformsEvents such as Black Friday or Cyber ​​Monday show that we buy more and more on the Internet, but doing it safely depends on the fact that whenever you make an online purchase you do it through reliable platforms and that you follow these tips for a safe purchase in Internet.

In #Internet the best security system is you. Protect yourself!CLICK TO TWEET

Guide to the safe use of email

In order to ensure the safe use of email, Andalucía es Digital offers you the Guide to a secure email that you can download and consult for free.

Do you browse from your smartphone? 7 keys to protect your mobile

The latest report on the Information Society in Spain , prepared by the Fundación Telefónica, indicates that, for the first time in history, browsing through mobile phones exceeds that carried out from desktop devices. Our smartphone has become the main gateway to the Internet and this forces us to take the necessary precautions to guarantee safe browsing on our mobile phones. How?

  1. Always download applications from official stores (Google Play and App Store) or from those where download security is accredited.
  2. Beware of QR codes . Before accessing a website by scanning QR codes, check that the site to which it refers you is safe. Expand the information in the free APP section for the computer security of your mobile in this post.
  3. Unlock codes . Always have them activated, either numeric or stroke, to prevent anyone from accessing the main menu of your phone. They are in the menu of your phone in Settings-Security.
  4. Essential IMEI code that you always have on hand and safely because, thanks to it, you can lock your device in case of loss or theft. Do you know how to get the IMEI code? Type * # 06 # to get to know it and save it in case it flies.
  5. Messaging services . We all use one and, as with social networks, it is convenient to stop for a moment to configure the privacy options of WhatsApp or Telegram to see what information we share and, in this case, what elements (videos, photos …) can be downloaded from directly on our mobile. Before clicking on a link that is sent to you by WhatsApp or Telegram make sure that it is reliable.
  6. Antivirus. Always installed on our device and with the option to review each and every one of the applications that we download to rule out any possible threat on our mobile device.
  7. Backup. Just like on your computer, periodically make backup copies of your contacts and documents of interest to have them available in case of a problem with your mobile phone or a security threat.

Do you want more information? Access to consult or download the Guide for the safe use of mobile devices on the Andalusia es Digital training portal.Check our guides for the safe use of email and your #smartphoneCLICK TO TWEET

Activate your Internet security system: 8 free tools

It is the turn of the tools that will help you maintain the computer security of your computers and with which you ensure that your personal data and your privacy on the Internet are safe. Having them is essential to avoid threats on the Internet, increase our degree of digital confidence and, ultimately, bet on safe browsing on the Internet. Here we leave you with a selection of free computer security tools:

  • AVG AntivirusIt is one of the best known free antivirus on the Internet. Easy to use and with regular updates, it is undoubtedly a good option to keep computer threats at bay. Download AVG Antivirus free at this link .
  • Bitdefender Free Edition AntivirusAnother free antivirus option with which you guarantee safe browsing. One of the advantages of Bitdefender is its easy handling and, once installed, it periodically sends reports and security analyzes on your equipment. Download Bitdefender for free at this link.
  • Avast Free Antivirus 2016The latest version of this free antivirus makes available to the user the possibility of accessing a service to generate online passwords. It has improved in performance and hardly interferes with team activity. Download Avast Free Antivirus 2016 at this link.
  • LastPass password managerIf you want to have strong and different passwords for each of your profiles or email accounts, it is best to bet on key generators like LastPass with which you can guarantee strong passwords. Download LastPass for free here.
  • Norton Identity SafeAnother option to generate secure passwords for free. We can customize the length, as well as the characters that will make up our password, which we can later store in a safe place to prevent access and possible computer threats. Download Norton Identity Safe for free here .
  • SpybotWith this tool you can have your system protected from malware and spyware, which as we have indicated are spyware that monitor and share the information on your computer. It has a paid version and a free version. Download SpyBot here .
  • Zone Alarm Free FirewallHaving a good Firewall is essential as a computer security measure. Many operating systems like Windows incorporate their own firewall as standard, but this is a free option and is equally recommended. Download Zone Alarm at this link .
  • Incibe AntiRansomware ServiceDue to the proliferation of Ransomware attacks that are occurring in recent months, the Internet Security Office (Incibe) has launched a free tool to help free the computers of those users and companies that have been affected by a Ransomware attack that hijacks computer equipment and asks the user for ransom. If you have been affected, access the Incibe service at this link .
  • Latch ARW AntiRansomwareA new free tool against which, without a doubt, is the main computer security threat at the moment: Ransomware. Latch ARW has been developed by the Eleven Path s team and can be downloaded free for Windows. On Chema Alonso’s blog , which is part of the development team, you can find the steps and instructions to protect your documents.

7 computer security APP for your mobile

What are the best security APPs for your mobile phone ? The answer is not easy, but we have prepared these lists of mobile applications for the computer security of your phone that you can consult and, if they convince you, download to your mobile phone:

  • QR ScanerBefore we have warned you about the dangers of QR Codes (of which there is certainly an interesting article by Eduardo Sánchez on the Andalusia Digital Commitment blog ) With this APP you can avoid being redirected to a site with malware through a QR Code. We leave you the link for Android and for IOS .
  • AppLockWith this application you will be able to encrypt access to the applications of your mobile phone to improve the security of your device and prevent access by outsiders. You can download it at this link if you are an Android user.
  • F-SecureOne of the best security applications for our mobile phone that, apart from virus detection, incorporates many more options such as filters, anti-phishing protection, secure purchases … It has a free version that you can download at this link.
  • Prey Anti-TheftVery useful in case of loss or theft since it allows you to block the device and limit access to photos or files that are stored on your mobile terminal. Download at this link.
  • Avast AntivirusThe free antivirus version for mobile that will allow you to be aware of any threat to your mobile device and that you can download for free at this link.
  • My BackupWith this application, which has a free version up to 100 MB, you can make a backup (or backup) of your mobile’s files and contacts and send it to the cloud at the email address you choose. You can download My Backup at this link .
  • Fing NetworkWith this application you can ensure the security of your Internet connections, since it performs a diagnosis of your WIFI network and detects if there is an intruder. You can download it free for Android or for IOS .

8 blogs to stay up to date on computer security

Do you want to be aware of any security alerts, virus or phishing attempts, solutions and computer security news? In these blogs you will find all the information to be permanently updated and you will obtain essential keys about cybersecurity. Take note:

  • Internet User Security OfficeA mandatory reference in terms of computer security. On the blog of the Internet User Security Office (OSI) you can find security notices, tips to keep your equipment and devices safe, cybersecurity notices, virus alerts, free security tools, test to measure your level of knowledge in cybersecurity …
  • Follow the White RabbitThis blog is the winner of the 2016 Bitácoras awards in the Computer Security section. Twenty experts in cybersecurity participate in it, offering topics both at the user and expert level in the security management of equipment and systems. On their main page they leave a phrase by Mati Aharoni that summarizes much of the spirit that permeates the blog: “The best security is achieved through training.”
  • A computer scientist on the evil sideThe blog of Chema Alonso has been for years a reference in computer security, both from the point of view informative, and at the level of experts in cybersecurity. Hacking, PC and mobile security, curiosities, humor … In a computer on the evil side there is room for everything. Not in vain the Chema Alonso blog has been active since 2006.
  • Pablo YglesiasThe blog of Pablo Yglesias (not to be confused with Pablo Iglesias if you Google) has been one of three finalists for the best blog about computer security at the awards Bitácoras 2016. Its content is stuck today and specializing in security news or about news on social networks that affect our privacy on the Internet.
  • Hiberus LegaltechIn this blog you can find useful and practical information about computer security measures at the user level, as well as legal advice against bad practices or crimes on the Internet (Legaltech).
  • Hacking from ZeroIf you are interested in computer security as a professional outlet , in this blog you can find abundant documentation and free courses with which to deepen and expand your knowledge about hacking.
  • Ethical HackingEqually focused on the professional field of computer security, this Andalusian initiative blog has become one of the references in the field of hacking. Those responsible are behind cybersecurity events such as qurtuba , recently held.
  • Security of the informationIn this blog you can find current news, as well as information about new professional profiles, a balance of new legal measures and analysis, from a strategic point of view of everything related to information security and Internet users.

Safety of minors on the Internet

We cannot talk about Internet security without dedicating a special mention to the privacy and security of minors on the Internet. For them and for their families, the Junta de Andalucía offers the Educar to Protect Guides in which you can find all kinds of references and advice for the safe use of ICT from 3 years to adolescence. Download or consult the Educating to Protect Guides at this link .

Leave a Reply

Your email address will not be published.