Connect with us

Hi, what are you looking for?

Tech News

How to protect a new computer from cyber attacks

How to protect a new computer from cyber attacks

View of a hacker working on a computer, in a file photograph. EFE/Sascha Steinbah

Perhaps one of the experiences that technology users enjoy the most is brand new a device, but that emotion must be accompanied by security once the computer is turned on for the first time.

When the browser is accessed without protection systems installed on the computer, malware can be filtered that intervenes in the email accounts or, the device could be used as a cryptocurrency miner.

Advertisement. Scroll to continue reading.

The virtual world, like the real world, is full of dangers, but for this reason you should not avoid using the internet, for example, it is only necessary to have some security precautions, in the same way that someone would do it when they leave their home. .

How to protect new computers from cyberattacks
How to protect new computers from cyberattacks

Here are the best security tips to avoid cyber attacks on new computers:

1. Apply automatic updates to the operating systems since in this way the security seals that Apple or Microsoft apply to their devices are renewed or reinforced.

Sometimes operating systems can come to market with vulnerabilities that have been missedbut when they are identified, developers work quickly to implement new security shields that present the user as a new update, so it is important not to miss any.

Advertisement. Scroll to continue reading.
Operating systems must be updated periodically to avoid cyber attacks (Photo: Pixabay)
Operating systems must be updated periodically to avoid cyber attacks (Photo: Pixabay)

two. Remove bloat apps that come pre-installed on computers and beyond fulfilling some function, they reduce the performance of the equipment, these programs are known as bloatware.

When this type of software is removed from the system, the vulnerabilities that could be identified by cyber attackers are reduced.

3. Perhaps the most obvious recommendation is to install an antivirus on the new computer, however, there are many cases of users who have received free 30-day trials of some security software, but after this time the system is no longer active on the computer and they forget to renew the purchase of the program.

Likewiseit is essential to be aware of the expiration date of the antivirus trial period to immediately make the purchase of the subscription for one year or the time indicated by the company, in this way the computer would not spend a single day unprotected.

Advertisement. Scroll to continue reading.
Antiviruses cannot be missing with computers
Antiviruses cannot be missing with computers

4.As a preventive act, backup copies of the information contained in the computer should be madeand much better if it is in an external memory so as not to depend on cloud storage that can also be intervened by cybercriminals.

5. Configure the privacy and security sections of the installed browser, as well as keep it updated to its latest version. It can also be very useful to install cybersecurity extensions that help block invasive advertising or access to suspicious websites, many of these browser applications are offered by the same antivirus companies.

6. Make use of authentication applications to add another security system to platforms that may store sensitive information such as email accounts. One of these applications is Google Authenticator to keep gmail accounts protected

Two-factor authentication.  helps protect accounts from cybercriminals (photo: The Neotheck Blog)
Two-factor authentication. helps protect accounts from cybercriminals (photo: The Neotheck Blog)

7. Download only legitimate applications and avoid all types of files of doubtful origin such as pirated games that could contain computer viruses.

Also, you may have been lucky enough not to download any viruses to your device when trying to install a pirated game, but the title may not work properly, may never open, may be incomplete, or may not be compatible with your computer’s operating system.}

Advertisement. Scroll to continue reading.

:

Advertisement. Scroll to continue reading.
Advertisement
Advertisement

Related

WhatsApp scam uses name of Iberia airline to distribute malware on cell phones

Tech News

A malicious message spread by WhatsApp seeks to make victims believe that the Iberia airline is giving away 5,000 tickets to travel through Europe....

The James Webb Telescope shows the hidden bones of this spiral galaxy The James Webb Telescope shows the hidden bones of this spiral galaxy

Tech News

Illustrative image of the James Webb telescope. (photo: CanalTech) Hubble Y james webb they came together again for a new mission. Although a few...

(Netflix/Reprodução) (Netflix/Reprodução)

Entertainment

Marilyn Monroe had a life full of ups and downs, with many controversies and controversies. Even though she has made her name in movie...

This liquid robot is capable of fully joining and separating, as well as traversing obstacles This liquid robot is capable of fully joining and separating, as well as traversing obstacles

Tech News

soft robot. (photo: Composition/Jose Arana/YouTube/The New Dawn) It sounds like something out of a science fiction universe, but it’s very real. Currently in the...

Advertisement

You May Also Like

Tech News

Video games present different ways in which a cybercriminal can steal information and money from users. the industry of video game presents a constant...

Tech News

Steam is one of the most popular shopping platforms online games where gamers go to enjoy new titles released to the public, mainly young...

Entertainment

Lalo España upset after the attacks they made on her deceased boyfriend, after criticizing AMLO (Photos: Instagram/@laloespanaoficial and CUARTOSCURO) After the actor Laura Spain...

Tech News

How to enable the “Remote Desktop” option. (photo: Internet step by step) The function of remote desktop allows Windows users to remotely log into...

Advertisement