Do your Computer has these Security features installed?
Antivirus software: Viruses can reach your computer in many ways, through floppy disks, CD-ROMs, email, web sites, and downloaded files. All need to be checked for viruses each time you use them. In other words, when you insert a floppy disk into the drive, check it for viruses. When you receive email, check it for viruses. When you download a file from the Internet, check it for viruses before using it. Your anti-virus program may let you specify all of these as places to check for viruses each time you operate on them. Your anti-virus program may also do this automatically. All you need to do is to open or run the file to cause it to be checked.
Antivirus software should be updated with DAT engines weekly from the antivirus company websites; This will detect the latest virus and will cure and delete them.
Firewall: On a computer, the firewall acts much like a guard when it looks at network traffic destined for or received from another computer. The firewall determines if that traffic should continue on to its destination or be stopped. The firewall “guard” is important because it keeps the unwanted out and permits only appropriate traffic to enter and leave the computer.
Lock computer : Always lock the computer screen when away from the desk. It is best if they log off of their terminal/workstation at night. There should be no written passwords or password hints on a users desk
Backups of Important Files and Folders : Always good to backup your data on to a external drive. This will be good practice to make sure you wont loose any data even if the computer crashes by hardware failure or by software problem.
Hard disk encryption : when the computer is on the network there are many ways to get hacked into the system with emails, network ports, internet.
When the hard disk of the computer is stolen, computer security features which are enabled will not protect the data been theft, Connecting the disk secondary can easily access the data.
To get rid of these problems, there is a software called Becrypt computer hard drive security , the entire disk will Becrypted, if this disk is stolen the data cannot be accessedOn connecting secondary.
The Becrypt disk on connecting primary will boot up with encrypted user id and password , once this get authenticated it allow the operating system to boot up.
Always have users lock their screen when away from their desk. It is best if they log off of their terminal/workstation at night. There should be no written passwords or password hints on a users desk