Solved

Available Security Software To Prevent Personal Computer Intrusion And Theft Of My Data

Posted on 2016-07-26
8
35 Views
Last Modified: 2016-08-22
Hello Experts -

I am concerned that some mischievous hack might extract gain access to my home computer, copy all my files, and then access my bank and brokerage accounts in a manner similar to that which affected the privacy of Hillary Clinton's server and the DNC's network.

Is there any good commercially software that can be deployed to prevent such an intrusion?

My computer(s) are located at residential address and are connected to the outside world via Comcast thru a D-Link Ethernet Router.  

Thanks for your input.

Gordon
0
Comment
Question by:gbmcneil
8 Comments
 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 250 total points (awarded by participants)
Comment Utility
You can get a VPN router that only permits access into your home network via secure VPN. That will stop nearly anyone.

Make certain ALL your computers have disabled administrator accounts.

Make sure the user accounts have strong passwords and log off when not in use.
0
 
LVL 6

Accepted Solution

by:
gilnov earned 250 total points (awarded by participants)
Comment Utility
Gordon,
The only 100% surefire way to prevent hackers from getting into your computer is to not use a computer. I heard quote from a well-known (in his community) hacker once that has stuck with me. I'm paraphrasing but, basically, he was saying that getting hacked is analogous to getting mugged. If you stick to the well-trafficked areas of the internet and don't stray into dark areas, you drastically reduce the odds you will be a victim. Ultimately, Cybercrime is a buisiness. It takes time and effort for to gain access to a computer, by whatever means, so bad guys want the biggest score per man-hour they can get. Yes, get some software (Microsoft's own Security Essentials for Windows 7 or Windows Defender for Windows 10 are excellent and free) and, yes, secure yourself behind a hardware firewall and do the things John Hurst suggests but don't lose too much sleep worrying about being hacked. Hillary and the DNC have lots of money and are, therefore, much bigger targets than you are. Not that you should make it easy for bad guys by opening phishy emails and clicking every cute puppy gif you see, mind you.
0
 
LVL 25

Expert Comment

by:madunix
Comment Utility
Take offline backups, visit only web-sites you trust, never open an attachment from addresses you don't know, never logon to a PC using an account that has admin rights and implement AV solutions
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 
LVL 5

Expert Comment

by:Gareth Tomlinson CISSP
Comment Utility
Oh, and even on forums like this, don't give out details such as your ISP (Comcast), the make of your router (DLink) and the fact you have brokerage and bank account details on your computer! At least, not on the public part of it; if you chat with an expert that helps, give them information privately.
Treat the Internet the way you would a stranger, would you tell them this information? And if a stranger walked up to you and said "come down this alley with me, i've got something to show you", what would you say?
1
 

Author Comment

by:gbmcneil
Comment Utility
I'd like to thank everyone from helping me with my situation.

You've given me enough information to implement enough safeguards to get me started.

Thanks in particular to John Hurst. You've helped me on a number of occasions, and I appreciate it.
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
You are very welcome. Please close the question when you come back here.
0
 

Author Comment

by:gbmcneil
Comment Utility
Hi John - I thought by selecting "Best Solution" that was done automatically.

I split the credit between you and gilnov.

Gordon
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now