Minimal Security Practices for common users

Muhammad SajjadDirector Information Technology
Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simple steps...

Emails are one of the primary sources of spreading Viruses, Trojans, Spyware, Malware, Ransomware and malicious code. Unless you are 100% sure of whom the e-mail came from and what the attachment contains, do not open or execute an e-mail file attachment. Do not enable any macros or contents in such attachments, especially with the unknown file extensions, as they rapidly spread.

Downloading software from the Internet is useful but sometimes can be very costly as well.  it is also one of the major sources of viruses, malware, spyware, and Trojans spreading and other malicious code to spread. Better do not install unnecessary software unless you really need it.  You may consult online, read reviews about it or consult a friend before grabbing a free copy of paid software..:)

Do not assume internet surfing,  social networking sites are always safe and do not click on links until you are sure they are legitimate. This includes pictures, videos, invitations to games and applications, and navigational elements.

Always use complex Passwords for your system and online accounts which should contain a mix of uppercase and lowercase letters as well as numbers or special symbols (like @%^ or #&!). the password should never be as simple as 12345678 or anything easy to guess.

Make sure all your important data backup is done with latest possible editions. It is especially Important that personal files / corporate office files are copied somewhere safely :)

Any antivirus software is only fully effective when it is turned ON and updated to most recent virus signature database so do not disable or deactivate your antivirus protection/scanning engine.

Social Engineering is an emerging way for the cyber and general criminal to procure personally identifiable information (PII) and login credentials, do not provide your personal or important details to any strangers by phone, email or any other way...

In the case you discover any unusual activity on your system and/or applications please immediately check your antivirus, logs, firewalls, and scan your computer ASAP.

Hopefully, these steps will be helpful not only in personal but corporate computing as well. 

This is my first ever online article and I am glad to get a start where experts share their expertise and knowledge. :)

 If you found this article helpful, please give it a thumbs up below.  This will help me to know what topics to cover in the future.



Comments (2)

Muhammad SajjadDirector Information Technology


Dear Thomas

Bundle of thanks for such valued suggestions, I will surely try to edit and repost the article.

Thanks Again
Nice points.

Taking regular backup and end-user education, few more security principles that will help to prevent breaches:

Have a question about something in this article? You can receive help directly from the article author. Sign up for a free trial to get started.