work

share

 

There will come a time when you feel that your computer is slowing down, becoming less efficient than it used to be, and what comes to mind is to either recycle or sell off the parts to get a brand-new computer. However, is it safe to do so? 

 

Most people would think that formatting the hard disk would completely clear the disk, so it would be safe to sell it off as a second-hand item. Unfortunately, with no proper precautions, someone can easily recover and extract personal or corporate data that was previously stored in the disk.  

 

share

 

Cybercriminals are constantly looking for new ways to manipulate victims online. With the right software in place and a general awareness of online threats, you can feel more guarded against an attack. Here’s a handy checklist to help you minimise your risk of being compromised. 

 

1. Install quality antivirus 

share

 

Any network or computer that’s connected to the Internet or any other external network is potentially at risk for an attack or threats. One method of protection is by installing an antivirus solution as this helps detect known threats. You can add another layer of protection by using Firewall as a barrier. 

 

share

 

Spam are unwanted bulk messages sent through electronic messaging systems. The most widely recognized form of spam is sent through email, but can also refer to bulk messages sent through other media such as: 

  • Instant messaging spam 
  • Search engine spam 
  • Mobile phone text messages 
  • Junk fax transmissions 
  • File sharing spam 

 

share

 

Passwords are the first line of defense to keep other people out of your computer, mobile phone, data and online accounts and this is why we must learn how to create strong passwords to protect ourselves. Unfortunately, many of the passwords people use are short and simple or have been used for a long period of time and for multiple accounts. Think of your password like a house key – it enables you to lock up your house, but you have to keep the key in a safe location. 

 

Basic guide to creating strong passwords 

Pages