Minimal Security Practices for common users

Published on
3,277 Points
Last Modified:
Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simple steps...

Emails are one of the primary sources of spreading Viruses, Trojans, Spyware, Malware, Ransomware and malicious code. Unless you are 100% sure of whom the e-mail came from and what the attachment contains, do not open or execute an e-mail file attachment. Do not enable any macros or contents in such attachments, especially with the unknown file extensions, as they rapidly spread.

Downloading software from the Internet is useful but sometimes can be very costly as well.  it is also one of the major sources of viruses, malware, spyware, and Trojans spreading and other malicious code to spread. Better do not install unnecessary software unless you really need it.  You may consult online, read reviews about it or consult a friend before grabbing a free copy of paid software..:)

Do not assume internet surfing,  social networking sites are always safe and do not click on links until you are sure they are legitimate. This includes pictures, videos, invitations to games and applications, and navigational elements.

Always use complex Passwords for your system and online accounts which should contain a mix of uppercase and lowercase letters as well as numbers or special symbols (like @%^ or #&!). the password should never be as simple as 12345678 or anything easy to guess.

Make sure all your important data backup is done with latest possible editions. It is especially Important that personal files / corporate office files are copied somewhere safely :)

Any antivirus software is only fully effective when it is turned ON and updated to most recent virus signature database so do not disable or deactivate your antivirus protection/scanning engine.

Social Engineering is an emerging way for the cyber and general criminal to procure personally identifiable information (PII) and login credentials, do not provide your personal or important details to any strangers by phone, email or any other way...

In the case you discover any unusual activity on your system and/or applications please immediately check your antivirus, logs, firewalls, and scan your computer ASAP.

Hopefully, these steps will be helpful not only in personal but corporate computing as well. 

This is my first ever online article and I am glad to get a start where experts share their expertise and knowledge. :)

 If you found this article helpful, please give it a thumbs up below.  This will help me to know what topics to cover in the future.



Author Comment

by:Muhammad Sajjad
Dear Thomas

Bundle of thanks for such valued suggestions, I will surely try to edit and repost the article.

Thanks Again

Expert Comment

by:Naveen Sharma
Nice points.

Taking regular backup and end-user education, few more security principles that will help to prevent breaches: https://www.lepide.com/blog/five-security-principles-to-prevent-data-breaches-immediately/

Featured Post

Get 10% Off Your First Squarespace Website

Ready to showcase your work, publish content or promote your business online? With Squarespace’s award-winning templates and 24/7 customer service, getting started is simple. Head to Squarespace.com and use offer code ‘EXPERTS’ to get 10% off your first purchase.

Join & Write a Comment

Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

Keep in touch with Experts Exchange

Tech news and trends delivered to your inbox every month