[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Available Security Software To Prevent Personal Computer Intrusion And Theft Of My Data

Posted on 2016-07-26
8
Medium Priority
?
45 Views
Last Modified: 2016-08-22
Hello Experts -

I am concerned that some mischievous hack might extract gain access to my home computer, copy all my files, and then access my bank and brokerage accounts in a manner similar to that which affected the privacy of Hillary Clinton's server and the DNC's network.

Is there any good commercially software that can be deployed to prevent such an intrusion?

My computer(s) are located at residential address and are connected to the outside world via Comcast thru a D-Link Ethernet Router.  

Thanks for your input.

Gordon
0
Comment
Question by:gbmcneil
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 98

Assisted Solution

by:John Hurst
John Hurst earned 1000 total points (awarded by participants)
ID: 41730484
You can get a VPN router that only permits access into your home network via secure VPN. That will stop nearly anyone.

Make certain ALL your computers have disabled administrator accounts.

Make sure the user accounts have strong passwords and log off when not in use.
0
 
LVL 7

Accepted Solution

by:
gilnov earned 1000 total points (awarded by participants)
ID: 41730496
Gordon,
The only 100% surefire way to prevent hackers from getting into your computer is to not use a computer. I heard quote from a well-known (in his community) hacker once that has stuck with me. I'm paraphrasing but, basically, he was saying that getting hacked is analogous to getting mugged. If you stick to the well-trafficked areas of the internet and don't stray into dark areas, you drastically reduce the odds you will be a victim. Ultimately, Cybercrime is a buisiness. It takes time and effort for to gain access to a computer, by whatever means, so bad guys want the biggest score per man-hour they can get. Yes, get some software (Microsoft's own Security Essentials for Windows 7 or Windows Defender for Windows 10 are excellent and free) and, yes, secure yourself behind a hardware firewall and do the things John Hurst suggests but don't lose too much sleep worrying about being hacked. Hillary and the DNC have lots of money and are, therefore, much bigger targets than you are. Not that you should make it easy for bad guys by opening phishy emails and clicking every cute puppy gif you see, mind you.
0
 
LVL 25

Expert Comment

by:madunix
ID: 41730690
Take offline backups, visit only web-sites you trust, never open an attachment from addresses you don't know, never logon to a PC using an account that has admin rights and implement AV solutions
0
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

 
LVL 5

Expert Comment

by:Gareth Tomlinson CISSP
ID: 41730756
Oh, and even on forums like this, don't give out details such as your ISP (Comcast), the make of your router (DLink) and the fact you have brokerage and bank account details on your computer! At least, not on the public part of it; if you chat with an expert that helps, give them information privately.
Treat the Internet the way you would a stranger, would you tell them this information? And if a stranger walked up to you and said "come down this alley with me, i've got something to show you", what would you say?
1
 

Author Comment

by:gbmcneil
ID: 41733349
I'd like to thank everyone from helping me with my situation.

You've given me enough information to implement enough safeguards to get me started.

Thanks in particular to John Hurst. You've helped me on a number of occasions, and I appreciate it.
0
 
LVL 98

Expert Comment

by:John Hurst
ID: 41733807
You are very welcome. Please close the question when you come back here.
0
 

Author Comment

by:gbmcneil
ID: 41733820
Hi John - I thought by selecting "Best Solution" that was done automatically.

I split the credit between you and gilnov.

Gordon
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hey fellow admins! This time, I have a little fairy tale for you. As many tales do, it starts boring and then gets pretty gory. I hope you like it. TL;DR: It is about an important security matter, you should read it if you run or administer Windows …
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question