Ten Tips to keep your WINDOWS healthy
How many people admits that installing or reinstalling Windows is is time-taking and backbreaking job and not likable to do for a same PC many times
Certainly, this is not our daily task, and so we need to ensure ourselves that after installation or re-installation we take extra care for using online !!! And secured !!!
Cyber criminals revealed new levels of ambition in last year !! So this is a must do task to that we follow some extra steps in order to increase our online security.
Before everything, We advice not to install or reinstall Windows XP, as Windows XP operating system is no longer supported by Microsoft. Install Windows Vista, Windows 7, 8, 8.1 or Windows 10 on your system.
1. Your Operating System should be up to date
Primarily, check for latest security updates and patches available for your Windows operating system.
To get the security updates automatically, go to Control Panel and check if your automatic updating is turned on or follow the steps below:
Find the search box in your Windows operating system, type update and then Windows Update.
-> Select Change settings. -> Click Install updates automatically (recommended), if not clicked .
After installation of available updates for your Windows operating system, keep the automatic update turned on in order to download and install the necessary updates that can help protect your computer against new viruses and security threats.
This is a truly necessary step to install the latest security and stability fixes for your operating system.
2. Not only operating system, also your Softwares
Also keep your softwares updated you are using, have the latest updates for your main programs and applications.
This is a well-known fact that malicious hackers try to exploit popular software, such as Java, Adobe Flash, Adobe Shockwave, Adobe AcrobatReader, Quicktime or popular web browsers like Chrome, Mozilla Firefox or Internet Explorer, be sure that you have the latest available patches.
3. Create a Clean Installation restore point
After you have installed your security updates for your Windows operating system, obvious task for you to create a Restore Point .
Restore point is used to restore your computer's system files to an earlier point in time. Restore points can be configured to automatically created each week by System Restore and when your PC detects change, like when you install an app or driver., or you can do it manually.
You can create the Restore Point as soon as your Windows installation is ready and name it Clean installation and then you can continue installing drivers and applications.
In case one of the drivers causes issues on the system, you can always go back to the Clean installation restore point.
Here's how to create a restore point.
Right-click the Start button, then select Control Panel > System and Maintenance > System.
In the left pane, select System protection.
Select the System Protection tab, and then select Create.
In the System Protection dialog box, type a description, and then select Create.
4. Use an antivirus
Use a known anti-virus. It is important to have a reliable security solution on your system, which will facilitate real-time scanning, automatic update and a firewall.
Windows 10 has built-in real-time antivirus named Windows Defender, and its pretty good. It automatically runs in the background, protecting against viruses and other threats.
If your security product that doesnt include a firewall, make sure you have turned on the Windows firewall. To turn it on, go into Control Panel, select Firewall, select Turn Windows Firewall on or off, then select Turn on Windows Firewall for all options.
5. Use additional security solution for other security layers
Perhaps, this is required to say that a every traditional antivirus solution cannot fully protect you against every latest malware out there. For instance, some malware and spywares are especially created to steal private data and confidential information and those use sophisticated methods to do so.
Malware,brief term for malicious software, is used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransom ware, spyware, adware , scareware, and other malicious programs. Also there are Rootkits and backdor users .It can take the form of executable code, scripts, active content, and other software.
So,even if you are protected against traditional viruses and spyware, you still need a specially designed software to protect you against financial theft and data stealing software.
To improve the financial control of your online banking account, you can always set banking alerts to track your account activity and apply other simple and effective financial protection tips.
6. Back up your system , Timely !
Now you are done with updating the operating system and your applications software, you have installed additional security products for your system safety and even created a Clean installation restore point for your Windows.
All meant to keep you safe from malicious software and online threats, but still there is chance to encounter hardware issues that may endanger your private information.
Let your data stay safe ! You may use a twofold plan, Combine a external hard drive usage with an online backup service.
Find a back-up solution which provides stability ,its easy to use that you wont have a headache backing up from files , allows you to synchronize your files with the online backup servers and provides encryption capabilities.
Our guide on how to do a data backup includes more information on most popular backup solutions available and what the best ways to keep your data safe are.
At the same time, you could simply use your Windows Backup system.
To set it up, access your Windows Control Panel and then click Backup and Restore to access the location. From this place, you can set an automatic backup, create a schedule and even choose a network location for your backup files.
7. Use a standard user account
Windows grants a certain level of rights and privileges depending on what kind of user account you have. You may have a standard user account or an administrator user account.
It is recommended to use standard accounts for your computer and without any serious need not to use Admin account for regular use. and to prevent users from making changes that affect everyone who uses the computer, such as deleting important Windows files necessary for the system.
Another advantage of using a standard account is that if malware infects a limited-user account ,can't do much damage as one infecting an administrator account
8. Secure your web browser before connecting to Internet
Your web browser is the main tool used to access the Internet and it is important to secure it before going online.
The vulnerabilities in your web browser are like open door invitations to attackers. Using these vulnerabilities, the attackers will try to manipulate private or important information.
To stay safe while accessing various web pages, make sure you respect the following:
Ensure using latest version for your browser.
Take necessary chages in your web browser settings.
Choose a private browsing session when you access a website you are not sure about. Choosing this browsing mode will prevent authentication credentials (or cookies) from being stored.
Since data stealing malware spreads through malicious code embedded in pop-up windows even in legitimate websites, make sure your web browser can block pop-ups:
9. Use BitLocker to encrypt your hard drive
BitLocker is a full disk encryption utility included with Windows Vista and later. It is designed to protect data by providing encryption for entire volumes.
Even if you set a password to your Windows account, intruders can still get access to your private files and documents. If you feel any chanceThey can simply do this by booting into their own operating system Linux, for example from a special disc or USB flash drive.
A solution for this is to encrypt your hard drive and protect all your files. It is wise to use this degree of security if you use a laptop, which can be very easily stolen.
BitLocker is available on the latest Windows operating systems and you may turn it on at any moment. Even after you have enabled the BitLocker protection, you wont notice any difference because you dont have to insert anything else but your normal Windows user account password.
To activate BitLocker on your system, follow these steps:
Go to Control Panel.
Access System and Security and click BitLocker Drive Encryption.
Turn on BitLocker.
For additional information on BitLocker, check this article.
If youd rather use another solution to encrypt your data and keep it away from prying eyes, there are plenty of options to choose from
10. Be careful when online and dont click suspicious links
To make sure you wont be infected by clicking on dangerous links, hover the mouse over the link to see if you are directed to a legitimate location.
Be abstained from clicking suspicions mail link.The Link may be a shortened Link or the Link Came to You in an Unsolicited Email or may be The Link Has a Bunch of Strange Characters in it !
So, how can you know where youll arrive if you click it
Then you can expand Shortened Links by using a service such as CheckShortURL or by loading a browser plug-in that will show you a short link's destination by right-clicking the short link. Some link expander sites will go the extra mile and will let you know if the link is on a list of known "bad sites".
Also can Scan the Link with a Link Scanner