Securing your new computer: the 10 essential steps according to ESET – Press Releases

The following text is taken from a press release and in no way reflects the opinion of the editorial staff.

So you have to think about cyber security before you even turn on your device. Refresh your memory and make cyber hygiene your number one priority.
What are the main threats to your PC?
Once the PC is connected to the Internet, hackers will seek to steal your data, encrypt the device and hold it ‘hostage’, extract financial details, secretly mine cryptocurrency, and more. They will use proven methods: hacking, stealing or guessing passwords or exploiting software vulnerabilities. The main threats include:
Phishing – Cybercriminals impersonate legitimate and trustworthy sources (banks, technology providers, retailers, etc.) and try to persuade users to click on links, open attachments in emails. This leads users to a bogus site asking them to fill in personal information (ID and/or address/financial details) or might trigger a secret malware download.
Nuisance Downloads and Malicious Ads – Sometimes visiting a website that is infested or showing malicious advertisement can trigger a malware download. Well-known sites may be less compromised because they have more resources and stronger protection. But there are plenty of examples proving that this is not always the case. It is therefore essential to invest in reputable security software and ensure that the browser’s security settings are correct.
Digital Skimming – Hackers can also compromise the payment pages of e-commerce sites with malware designed to ‘silently’ collect your card data as it is entered. It is difficult to protect against it because the problem comes from the supplier. Buying from more well-known sites can reduce risk.
Malicious apps and files – Cybercriminals also hide malware in legitimate-looking apps and downloads. Many are posted on online forums, P2P sites and other third-party platforms. It therefore makes sense to download only from trusted sources and use effective security software to scan for malware.
Ten tips to protect your computer The steps that follow may be taken care of automatically by your PC manufacturer or Microsoft, but it’s worth investigating a little more to ensure that all settings are as secure as possible. Here are the top 10 IT security tips:
1. Install automatic updates for PC operating system and software
2. Remove bloatware that often accompanies PCs. Check to see if you recognize any software to make sure removing it won’t degrade performance. The less software there is on the device, the less opportunity attackers have to exploit bugs in it
3. Install multi-layered security software from a reputable third-party vendor and install all updates
4. Configure backups and save a copy of data to a remote storage device maintained offline
5. Secure the browser by adjusting privacy and security settings and ensuring it is the latest version
6. Turn on and configure the firewall on the operating system and the home router, making sure it is protected with a strong password
7. Download a multi-factor authentication app to protect your accounts against phishing or other attacks
8. Avoid using USB drives other than your own, they may contain malware
9. Use a password manager so that all your credentials are unique, strong and hard to crack
10. Only download apps/files from trusted sources and avoid pirated material, which can often be tricked by malware.

Even following these good tips, there are still risks when browsing online. Always proceed with caution, do not respond to unsolicited emails/online messages and ensure that device encryption is enabled.

About ESET For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers around the world against ever more sophisticated digital threats. From endpoint and mobile security to EDR, encryption, two-factor authentication, ESET’s lightweight and high-performance solutions protect and monitor 24/7, updating defenses in real time. in order to ensure the safety of users and businesses without interruption. Ever-evolving threats require a scalable IT security provider that enables the safe use of technology. This is supported by ESET R&D centers around the world, working to support our common future. For more information visit , or follow us on LinkedIn, Facebook, Twitter and .

Securing your new computer: the 10 essential steps according to ESET