Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
What Is Desktop Configuration?
#1
Lightbulb 
Quote:
[Image: Dora-Desktop-Configuration-1030x360.png]

The Importance of Desktop Configuration. Desktop Security Best Practices.

Configuration represents the way in which a system is set up, related to the assortment of components that make up the system, it can refer to hardware, software, or a combination of both. When talking about desktop configuration we are referring to the sum of actions that we as users can take in order to make sure that the machine we’ll be using will run smoothly and in a secure manner.

Desktop Security Best Practices

Vulnerabilities are every attacker’s entry point, therefore all computer operating systems should be properly protected.

In a networked environment, a compromised computer can affect other computers and disrupt services throughout the campus. More than that personal information can be compromised leading to identity theft and many other important security issues.

Let’s take a look into what steps can you take in order to reduce the intrusion risk and minimize the damage.

Keep Up to Date the Operating System Patches

Patching your computer on a regular basis is one of the most important and fundamental routine tasks.

There are no operating systems without vulnerabilities embedded in the software code. These vulnerabilities can be exploited by malicious actors in order to gain access to the computer system, as on the Internet exist a myriad of programs that are constantly searching for unpatched computers, so it would be wise that prior to connecting a new computer to the Internet, to make sure the latest critical patches are installed.

Encryption Should be Used to Encode Sensitive Information

It is a known fact that the best way to secure sensitive information from malware is to encrypt it, this works by using a complex formula that scrambles (or encrypt) in a secure way the individual files and folders, entire disks, and data transmissions between devices, making the information to only be unlocked (or decrypted) using complex digital keys that require a password.

Install and Configure for Daily Activities Trusted Antivirus Software

An antivirus program’s job is to protect you and your devices against computer viruses, or attacks that are meant mean to damage a computer.

A good antivirus is a must-have. It minimizes the times you have to enter damage control mode to clean up the mess caused by a successful malware attack.

Before you proceed in your journey to find your dream security software, let’s see how exactly an antivirus works

Install and Configure a Firewall

Whenever a computer can be accessed through an internet connection or Wi-Fi network, it becomes susceptible to attack, but fortunately, you can restrict the outside access to your computer, and the information stored on your device with the use of a firewall.

A firewall’s purpose is to provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic, the firewalls are also able to prevent malicious software from accessing a computer or network via the internet and can be configured to block data coming from certain locations, applications, or ports while allowing relevant and necessary data through.

Follow Best Practices When Opening Email Attachments

A primary source of malicious code is represented by email attachments, therefore one should always make sure that the sender really intended to send the attachment their way in the first place.

Many variations of viruses can automatically propagate themselves by first infecting a given computer and then sending emails to all addresses housed on the infected machine, with the sender message appearing to be legitimate even though the actual individual never sent the message.

Follow best practices in regards to password policies

The first mean of authenticating in order to access any desktop system is the user name and password that follows it.

The password you create should be as hard as possible to guess, or “crack”, with many programs and applications existing that can crack a simple password, but if the password you create is complex and properly constructed, these apps will have a hard time and will not be able to succeed and crack your password.

Avoid Peer to Peer File Sharing

Peer to peer file sharing programs are a known and well-­‐documented risks, because by opening up a hard drive to anyone on the Internet who uses a given p2p program Malware, spyware, viruses, Trojan horses, worms, and keylogging programs could all be downloaded in the process of p2p file sharing.

Regularly Schedule Backups in order to Protect Data

All computers will malfunction at some point, hardware will fail at some point, and in order to protect the data on a device, it’s extremely important to back up your data. This should be done on regular basis on a physical drive or a cloud-based one in order to make sure that your data will not be lost in case of hardware failure.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
GFYI [Official] Ashampoo Snap 16 Giveaw...
GIVEAWAY / CONTEST I...jasonX — 06:19
GFYI [Official] VTubeGo Downloader 2004...
GIVEAWAY / CONTEST I...jasonX — 06:19
GFYI [Official] Wise Video Converter Pr...
We are pleased to an...jasonX — 06:17
GFYI [Official] EaseUS Data Recovery Wi...
We are pleased to an...jasonX — 06:17
Mozilla Firefox Browser 125.0
Mozilla Firefox Br...harlan4096 — 06:16

[-]
Birthdays
Today's Birthdays
avatar (48)fuspeukChark
avatar (42)werriewWaiNg
avatar (36)Freemanleo
Upcoming Birthdays
avatar (43)wapedDow
avatar (47)oapedDow
avatar (40)Sanchowogy
avatar (42)techlignub
avatar (41)Stevenmam
avatar (48)onlinbah
avatar (49)steakelask
avatar (43)Termoplenka
avatar (41)bycoPaist
avatar (47)pieloKat
avatar (41)ilyagNeexy
avatar (49)donitascene
avatar (49)Toligo
avatar (36)RobertUtelt

[-]
Online Staff
There are no staff members currently online.

>