The top privacy and computer security problems

Data security is one of the major problems businesses worldwide are dealing with today. Thus, it pays to know the top privacy and computer security problems, to determine cost-effective solutions.

Computer privacy and security are one of the top problems that are being dealt with by anyone using a computer. From Linux, UNIX, and Windows platforms to other services and applications, there is a report weekly on recently found security concerns in the software. So, what then are the top privacy and computer security problems and what can we do to address them?

Nowadays, operating systems have fewer susceptibilities that may lead to the breakout of worms found on the Internet. For example, from 2000 to 2005, worms like Zotob, Nachi, and Blaster, were found in Microsoft Windows, and these contaminated a number online servers and systems. However as of late, most worms are discovered in back-ups, applications, and anti-virus software. One of the most publicized was last year’s worm that exploited the anti-virus shield of Symantec.

Employees who are allowed to surf are fast becoming a major security concern for businesses. More than ever, it is essential for organizations to make the security of their servers and services a priority by putting up blocks and firewalls to prevent users from compromising their computers and equipment through client-targeted assaults and nasty sites on the Internet.

There has also been an alarming growth in the statistics of client-side susceptibilities, including those that are found in office software, media players, downloaded browsers, and other applications found on the desktop. All these are being found on numerous operating systems, which are rampantly being distributed and usually used for Botnets recruitment drive.

Half the total number of susceptibilities in the past year that were discovered is comprised of web applications based via open-sourcing. Being circulated extensively, these vulnerabilities are designed to change websites that are trusted to become servers for client-side exploitation with malicious intent, like phishing scams.

Another pressing problem faced is that the configurations that are being defaulted for a lot of operating services and systems are still quite weak and are still including passwords that are defaulted. Because of this, various systems are placed in a compromising situation through attacks, such as dictionary and password guessing.

As attackers and hackers are now becoming increasingly creative in finding solutions to getting data that are classified and sensitive, it is therefore critical to investigate the nature and source of any information that is being brought outside the company’s or private individuals’ vicinity.

Given these aforementioned problems, most companies employ highly skilled IT professionals to combat such. But how can we, as individuals, protect our own personal privacy? The following are recommended:
Have ground rules set. Agree with yourself and your family as to what one is allowed and not allowed to do online.

Install security features and software. Know what security features are built-in to help you control and monitor who can access your computer. Invest in anti-virus, anti- spyware, and firewall applications.

Avoid Pop-ups. The web browser can actually help you minimize cookies and pop-ups that appear when surfing the net. Some of these advertisements are deceiving and designed to get personal and financial details.

Have passwords that are strong and keep them safe. Passwords should be alphanumeric with special character combinations. Record them privately in your diary or in a place that is inaccessible. Password management programs are also recommended.

Never divulge personal information. If it is not necessary, do not give out personal information. You can also use aliases and nicknames.

Comments are closed.