The Wonders of Defensive Computing

The rapid advancement in computers and the increase of the use of its applications has paved the way for a practice called defensive computing. This practice has been developed to combat the different threats that may arise from the use of the computers and thus pinpoint solutions on how to anticipate problems such as lapses in network security and data loss. People who engage in this practice know just how important data in their computers can be and are willing to take steps in ensuring the safety of computer data.

To begin with, we must first acknowledge the fact that most of the danger that exists for our computers come from the access of the internet. By willingly allowing one’s computer to share its connection to tap into the massive information resource called the internet, one also allows itself the risk of potentially having other people to access information coming from one’s computer. But by practicing defensive computing, these risks are minimized. Some of the methods to use include the installation of a firewall, which serves as filter for both incoming and outgoing connections and communications with the computer, and thus can block unauthorized access to one’s computer.

The presence of anti-malware software also serves as a good practice of defensive computing, as programs that contain malicious intent for one’s computer may still escape the detections of a firewall.

It is also vital that one be very wary of the content of the websites that one visits, or be very cautious on the files that one intends to download. Many of the malware programs that exist today appear in a number of disguised forms. Actions such as opening e-mail attachments without first scanning or checking for threats is a big no-no in this practice. Users should be wary of misleading subject lines or appealing words on their electronic mails, as these may contain harmful software.

Along with these practices, the constant practice of saving and backing up data is as crucial as to the aforementioned above. Among the effects that malware can bring to the data stored in one’s computer is the ability to corrupt or delete them. As malware is continuously being developed and newer threats emerge every now and then, there would always be a threat for a possible deletion of data. Thus, it is highly recommendable that aside from constantly updating one’s anti-malware software, one has to constantly engage in the practice of copying and saving back-up files. Users may choose to save data that they deem important in another computer, or place them in external storage devices such as CDs, DVDs, or flash drives. Users may also opt to having some sort of restoration software installed. These are programs that allow data previously saved in the computer and deleted unintentionally to restore them.

Practicing defensive computing is therefore crucial in today’s Internet age, especially when you often use your computer. One must be able to abide to these practices to guarantee the smooth performance and security of his/her computer.

Download antivirus program are available in the internet. The current Norton Internet Security download packages are Norton Internet Security 2011 and Norton 360 All-In-One Security.

About Author

Leave A Reply