On of them may have virus’s that when

On average a person will spend over 3000 hours a year using an electronic device and during this time they’ll be under constant threat from hackers and viruses. There are many security issues that might threaten system performance: SPAM is junk mail and it gets sent to you without you asking for it and it also results in our email accounts being blocked; some of them may have virus’s that when opened would slow down the computer as they take up a lot of memory. This virus’s can corrupt files, stop some programs from working, and can stop computers switching on and off. Adware is another security issue in which pop-ups are constantly popping up this can slow computers down as they interrupt other programs from working. Hackers can heavily threaten system performance as they can sometimes install programs that you haven’t put on your computer. Sometimes these programs can contain spyware, malware, and viruses that can also slow your computer down.Many precautions can be taken to protect your data and computer systems. These include: updating your anti-virus software and making regular virus checks. It is vital to update anti-virus software and regularly check whether it is still in date and hasn’t expired because if the software is out of date by literally just hours this would mean that the computer isn’t protected and would mean that it would be easy to get viruses into your computer system. Another precaution would be backing up data and ensuring backups are in a physically separate location. If data isn’t backed up and files on your computer get deleted or damaged then a back up would be there as a second copy and by keeping these in separate locations to the original copy it would mean that it would have a better chance of not being touched. You’d also need to install and adjust firewall settings to make sure that the computer system is protected from any external threats. Finally, you should have a software patch to prevent malware from getting on your computer system and ensuring that, in terms of companies, that some people have more access to information or areas than others. For example, important CEO’s or IT technicians would have greater access to confidential information than lower level employees. This is vital in ensuring that hackers can’t easily breach the computer systems of that company.
Personal information and access to systems can be kept secure by firstly being alert to impersonators by making sure you know who is getting your personal or financial information. By not giving out personal information on the phone, through the mail or over the Internet unless you’ve initiated the contact or know who you’re dealing with. If a company that claims to have an account with you sends an email asking for personal information, don’t click on links in the email. Instead, type the company name into your web browser, go to their site, and contact them through customer service. Or, call the customer service number listed on your account statement. Ask whether the company really sent a request. Secondly by safely disposing of personal information by getting rid of all the personal information by using a wipe utility program to overwrite the entire hard drive. And before you dispose of a mobile device, check your owner’s manual, the service provider’s website, or the device manufacturer’s website for information on how to delete information permanently, and how to save or transfer information to a new device. Remove the memory and/or SIM card from a mobile device. Remove the phone book, lists of calls made and received, voicemails, messages sent and received, organizer folders, web search history, and photos. Thirdly by encrypting your data by keeping your browser secure. To guard your online transactions, use encryption software that scrambles information you send over the internet. A “lock” icon on the status bar of your internet browser means your information will be safe when it’s transmitted. Look for the lock before you send personal or financial information online. Another method would be keeping your passwords private by using strong passwords with your laptop, credit, bank, and other accounts. Finally by not oversharing on social media sites because if you post too much information about yourself, an identity thief can find information about your life, use it to answer ‘challenge’ questions on your accounts, and get access to your money and personal information. Consider limiting access to your networking page to a small group of people. Never post your full name, address, phone number, or account numbers in publicly accessible sites.
There are many risks to social media such as bullying, cyber-stalking, access to age-inappropriate content, online grooming and child abuse, encountering comments that are violent, sexual, extremist or racist in nature, people trying to persuade or harass you into changing your basic beliefs or ideologies, or adopt an extremist stance, prosecution or recrimination from posting offensive or inappropriate comments and many more.
And because of this long list of risks you have to be careful and avoid these risks and enjoy using social networking sites by following a few sensible guidelines: do not let peer pressure or what other people are doing on these sites convince you to do something you are not comfortable with, be wary of publishing any identifying information about yourself – either in your profile or in your posts – such as phone numbers, pictures of your home, workplace or school, your address or birthday, pick a user name that does not include any personal information. For example, “mo_mogadishu” or “mo_bolton” would be bad choices, set up a separate email account to register and receive mail from the site. That way if you want to close down your account/page, you can simply stop using that mail account. Setting up a new email account is very simple and quick to do using such providers as hotmail, yahoo, mail or gmail, use strong passwords, keep your profile closed and allow only your friends to view your profile, what goes online stays online do not say anything or publish pictures that might later cause you or someone else embarrassment, never post comments that are abusive or may cause offence to either individuals or groups of society, be aware of what friends post about you, or reply to your posts, particularly about your personal details and activities, remember that many companies routinely view current or prospective employees’ social networking pages, so be careful about what you say, what pictures you post and your profile, don’t post your holiday dates – or family photos while you are away – as social networking sites are a favourite research tool for the modern burglar, learn how to use the site properly. Use the privacy features to restrict strangers’ access to your profile. Be guarded about who you let join your network, be on your guard against phishing scams, including fake friend requests and posts from individuals or companies inviting you to visit other pages or sites, if you do get caught up in a scam, make sure you remove any corresponding likes and app permissions from your account, ensure you have effective and updated antivirus/antispyware software and firewall running before you go online.
In conclusion, one’s privacy on the internet is very important because of all the applications, services, scams and viruses on the internet that are waiting for any given chance to steal someone’s personal material. If all people could protect themselves and use the right software, they would be much safer, and it would be harder to have personal information stolen from them. Anyone using the internet should take into consideration the importance of their safety on the World Wide Web.