Safe Computing Checklist | A beginner’s practical guide to a secure computer

Ishmeet Singh
2 min readNov 7, 2017

--

Safe Computing Checklist
  1. Automatic Software and OS Updates
    Set up your computer for automatic software and operating system (OS) updates. A machine without regular software updates is more likely to have software vulnerabilities that can be exploited by hackers.
  2. Install Anti-Virus Software
    The anti-virus software should be set to scan your files and update your virus definitions on a regular basis.
  3. Choose Strong Passwords
    Strong passwords use a combination of letters, numbers, and special characters. Create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly.
  4. Use Two Factor Authentication (2FA)
    Two Factor Authentication, also known as 2FA, two step verification or TFA (as an acronym), is an extra layer of security that is also known as “multi-factor authentication” that requires not only a password and username but also something that only, and only, that user has on them. Eg. Google Authenticator App
  5. Back-up your data on a regular basis
    Regular, scheduled backups can protect you from the unexpected. Keep a few months’ worth of backups and make sure the files can be retrieved if needed.
  6. Control Access To Your Machine
    Don’t leave your computer in an unsecured area, or unattended and logged on, especially in public places. The physical security of your machine is just as important as its technical security.
  7. Use Email And The Internet Safely
    Ignore unsolicited emails, and be wary of attachments, links, and forms in emails that come from people you don’t know, or which seem “phishy.” Avoid untrustworthy (often free) downloads from freeware or shareware sites.
  8. Use Secure Connections
    When connected to the internet, your data can be vulnerable while in transit. Ensure that you do not connect to the internet over an open or unencrypted network.
  9. Protect Sensitive Data
    Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive, which is also recommended when recycling or re-purposing your computer. Use the encryption tools built into your operating system to protect sensitive files.
  10. Use Desktop Firewalls
    Mac and Windows computers have basic desktop firewalls as part of their operating systems. When set up properly, these firewalls protect your computer files from being scanned.

Most importantly, stay informed. Stay current with the latest developments for your operating system and software installed on your system.

--

--

Ishmeet Singh

Blockchain Expert. Cryptocurrency Enthusiast. Coder. Trader. Entrepreneur. @SinghIshmeet0