Due to vulnerabilities in Operating System and other application
software users' online accounts can become compromised through phishing
schemes, viruses, and spyware. Users can secure their own account and
their online identity quickly and easily by following the online safe
practices. Some of the safe practice I regularly follows are listed
below. You may look into these steps and take a decision today itself
to safe guard from Online frauds.
There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.
You may be able to easily identify people who could, legitimately or not, gain physical access to your computer - family members, roommates, co-workers, members of a cleaning crew, and maybe others. Identifying the people who could gain remote access to your computer becomes much more difficult. As long as you have a computer and connect it to a network, you are vulnerable to someone or something else accessing or corrupting your information; however, you can develop habits that make it more difficult.
Sometimes the threats to your information aren't from other people but from natural or technological causes. Although there is no way to control or prevent these problems, you can prepare for them and try to minimize the damage.
________________________________________ Both the National Cyber Security Alliance and US-CERT have identified this topic as one of the top tips for home users. Authors: Mindi McDowell, Allen Householder ________________________________________US-CERT Cyber Security Tip ST04-003. Produced 2007 by US-CERT, a government organization.