MACH37 Cybersecurity Guide: PC Security

Key Takeaways

  • Software updates are critical to the security of your device because they include the latest vulnerability patches from the provider.

  • Subscribing for a software security suite is an effective way to get many critical services such as antivirus, antispyware, firewalls and even VPNs or password managers.

  • Backing up your data is the most surefire defense against losing everything to malware.  

Your devices are a good place to start cyber securing your personal life. We hold and look at these devices daily, so they are important to us and we are familiar with them. Luckily, securing your devices can be pretty simple and highly effective. This blog will cover the main ways that you can practice good cyber hygiene for your personal devices.

Keep everything updated!

Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to update to the latest security software, web browser, and operating systems. A habit to break out of is clicking ignore when your system asks you to update, you’re probably no stranger to those little pop-up windows. When your device notifies you that it’s time to update the software — don’t wait, update right away!  If you have the option to enable automatic updates to defend against the latest risks, turn it on: instructions for Windows, instructions for Mac

Hackers look for security flaws, also known as software vulnerabilities. Hackers can take advantage of the weakness by writing code to target the vulnerability. Companies like Microsoft and Apple are always racing to patch these vulnerabilities that the hackers discover and these companies roll these software patches out to their customers in the form of updates.

Use security software

Many security services are bundled into something called a security suite. These are paid for by subscription. Basic suites come with antivirus, firewall, antispam, anti adware, antispyware and parental control. Advanced suites come with backups, a VPN, password management or other security extras.

Anti-virus (AV) protection software has been the most prevalent solution to fight malicious attacks. AV software blocks malware and other malicious viruses from entering your device and compromising your data. Use anti-virus software from trusted vendors and only run one AV tool on your device. There are many kinds of antivirus software available, so find one that fits your needs and your devices. We won't recommend a specific vendor but there is a general consensus on the top five or so

Using a firewall is also important when defending your data against malicious attacks. A firewall helps screen out hackers, viruses, and other malicious activity that occurs over the Internet and determines what traffic is allowed to enter your device. Windows and Mac OS X both come with their respective firewalls, aptly named Windows Firewall and Mac Firewall. Your router should also have a firewall built in to prevent attacks on your network.

All of these features are important. You simply need to research which vendor is best for your device and security needs and make the decision. The most important thing is that you actually have these services.

 

Backup your data

If you become a victim of ransomware or malware, the only way to restore your data is to erase your systems and restore with a recently performed backup.

Backing up your data regularly is an overlooked step in personal online security. The top IT and security managers follow a simple rule called the 3-2-1 backup rule. Essentially, you will keep three copies of your data on two different types of media (local and external hard drive) and one copy in an off-site location (cloud storage).

Physical security

The physical security of your devices is just as important as their technical security. 

The threat: if your computer is stolen, attackers can mine the data on the hard drive for personal information or an attacker can access your device while it is left unlocked and unattended.

How to defend:

  • If you need to leave your laptop, phone, or tablet for any length of time - lock it up so no one else can use it. 

  • If you keep protected data on a flash drive or external hard drive, make sure it's encrypted and locked up as well. 

  • For desktop computers, lock your screen or shut-down the system when not in use.

  • Leverage Find my iPhone or the Android Device Manager to prevent loss or theft

  • Ensure that all users on your computer have strong passwords that are difficult to brute-force.

  • Use full-disk encryption on all of your computer’s disks. You can use this by turning on FileVault (for Mac) or BitLocker (for Windows). Without this, attackers can boot your drive in another operating system and access all your files without your password.

  • Set your computer to lock after a short time of inactivity, and actively lock you computer whenever leaving it.

Turn off Bluetooth when you’re not using it

Bluetooth technology offers convenience - from hands-free phone calls to wireless file-sharing to playing music on a vehicle's speakers. But leaving your Bluetooth on all the time can be dangerous, and hackers are exploiting the technology to access private information, spread malicious software and more.

BlueBorne, a hack that can infect iOS, Android, Windows and Linux devices, is spread through the air. The attack works in stages - once a hacker finds an active Bluetooth device nearby, he identifies its unique MAC address. He then determines its operating system and adjusts the attack, exploiting any weaknesses. From there, he gains control of the device and can use it for a multitude of purposes.

The main takeaway: turn off Bluetooth when you don’t need it.

Conclusion

Device security is important because it keeps your information protected. It’s also important for your computer’s overall health; proper computer security helps prevent viruses and malware, which allows programs to run quicker and smoother. The advice in this blog will help defend you and your investment in a personal computer.