SlideShare a Scribd company logo
1 of 4
10 Security
  loopholes




Are you vulnerable?
Computer security is one of the biggest concerns in today’s digital world. If
your computer is not secure, then your financial world and personal world
are always at risk. Are you still vulnerable to digital disasters like malware
wiping out your PC, online accounts hacking, or becoming a victim
of identity theft?
Here are some of the most security loopholes and simple steps to avoid
them and make your computer and online world more secure.

1. Mobile devices and PIN protection

We are now no more just on laptops and computers. Smartphones and
tablets make up for most of our digital world today. So, imagine if your tablet
or smartphone gets stolen or lost, how much you will really lose. With just
one device gone, anyone can have access to your photos, files, text
messages and even access to your other accounts, thanks to the different
apps you downloaded.
You need to do a very simple thing; enable lock screen protection that
requires a PIN or password before using the device. Though PIN does not
guarantee 100% safety, it is the first step for initial security for your mobile
devices.

2. Anti-theft app for mobile devices

If your smartphone, iPad or tablet is stolen then we take it for granted that
we are never going to see it again. However, if there is a smartphone anti-
theft app installed then there are still chances of recovery. You can
remotely locate it on a map from any other device you have or even from
your computer. It will play a siren and help you locate your phone. You can
even use this anti-theft app to wipe your device, if you feel you just would
not get it back.

3. Anti-theft solution for laptops

Just like tablets and Smartphones, you can even setup anti-theft solution for
your laptop. If it is stolen by any chance, you can remotely locate it with Wi-
Fi and IP address locations. However, it has to be connected to the Internet.
There are also some anti-theft solutions that lets you remotely control the
web cam and monitor the screen as well.
4. Perform PC security checks

Another very common security loophole that makes us vulnerable is
skipping PC security checks. Don’t ignore when your computer prompts for
a security or system scan. You just can’t do without an antivirus. It is like
trying to drive a car without wheels. Have antivirus, firewall and other
security tools in place before working on your computer.

5. Laptop encryption

Setting up a password to log in to your PC is the most basic thing and it can
easily be bypassed, giving ready access to your files and personal
documents. The best thing to do is get your laptop hard drive encrypted.
This will stop anyone from removing or bypassing your password, keeping
your system safe.

6. USB drive encryption

The use of USB and flash drives are quite common today. All you have to
do is plug them in and get immediate access to all the files that you need.
However, with this flexibility there are also security loopholes that can put all
your files at a risk. If you are storing any sensitive documents on external
drives, it is best to encrypt them that require a password before the access
is given. It is best to go for 256-bit AES encryption.

7. Social network accounts security

If you are not paying attention to your social network, then it is just going to
be a part of time when you will be taken by malicious links and social apps
that try to get access to your personal information or money or even spread
spam. And wait, this does not include the privacy issues that come in play.
There are different social security apps that help you catch different online
threats. Here are some social security apps to check out.

8. Get online backups

You already know that you need to create a backup of your computer’s hard
drive. But what will you do if the backup disk goes bad? Using an online
backup service is a good way to protect your valuable documents, as a
second backup. You can select from many antivirus companies providing
online backup services to its users.

9. OpenDNS for content filtering

Do you think OpenDNS is only for families that have young kids? Other than
blocking adult and inappropriate websites, OpenDNS also helps block virus
spreading websites and other online threats. The basic level OpenDNS
service is free and it applies to both personal computers or even the entire
network.

10. Wi-Fi network security

Have your Wi-Fi encrypted is one the most important things to do to avoid
unwanted visitors on your network. Don’t let people you don’t know get
inside your Wi-Fi. If you have a home network then make sure it asks for a
password before giving access. This is the simplest step for Wi-Fi
encryption.
Avoiding these simple security loopholes can help keep you safe and
secure in 2013.

More Related Content

More from iYogi

iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaineiYogi
 
Worldwideweb
WorldwidewebWorldwideweb
WorldwidewebiYogi
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi
 
Worm
WormWorm
WormiYogi
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn ciYogi
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi
 
Electronic brains
Electronic brainsElectronic brains
Electronic brainsiYogi
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy liYogi
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy wiYogi
 
Dianna l
Dianna lDianna l
Dianna liYogi
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer reviewiYogi
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1iYogi
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of TechnologyiYogi
 
Consumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiConsumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiiYogi
 
33% parents say “iDo!” to iPad for their kids - iYogi
33% parents say “iDo!” to iPad for their kids - iYogi33% parents say “iDo!” to iPad for their kids - iYogi
33% parents say “iDo!” to iPad for their kids - iYogiiYogi
 

More from iYogi (16)

iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaine
 
Worldwideweb
WorldwidewebWorldwideweb
Worldwideweb
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITER
 
Worm
WormWorm
Worm
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn c
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn b
 
Electronic brains
Electronic brainsElectronic brains
Electronic brains
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie c
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy l
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy w
 
Dianna l
Dianna lDianna l
Dianna l
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer review
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
 
Consumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiConsumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogi
 
33% parents say “iDo!” to iPad for their kids - iYogi
33% parents say “iDo!” to iPad for their kids - iYogi33% parents say “iDo!” to iPad for their kids - iYogi
33% parents say “iDo!” to iPad for their kids - iYogi
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

10 security loopholes: Are you vulnerable?

  • 1. 10 Security loopholes Are you vulnerable?
  • 2. Computer security is one of the biggest concerns in today’s digital world. If your computer is not secure, then your financial world and personal world are always at risk. Are you still vulnerable to digital disasters like malware wiping out your PC, online accounts hacking, or becoming a victim of identity theft? Here are some of the most security loopholes and simple steps to avoid them and make your computer and online world more secure. 1. Mobile devices and PIN protection We are now no more just on laptops and computers. Smartphones and tablets make up for most of our digital world today. So, imagine if your tablet or smartphone gets stolen or lost, how much you will really lose. With just one device gone, anyone can have access to your photos, files, text messages and even access to your other accounts, thanks to the different apps you downloaded. You need to do a very simple thing; enable lock screen protection that requires a PIN or password before using the device. Though PIN does not guarantee 100% safety, it is the first step for initial security for your mobile devices. 2. Anti-theft app for mobile devices If your smartphone, iPad or tablet is stolen then we take it for granted that we are never going to see it again. However, if there is a smartphone anti- theft app installed then there are still chances of recovery. You can remotely locate it on a map from any other device you have or even from your computer. It will play a siren and help you locate your phone. You can even use this anti-theft app to wipe your device, if you feel you just would not get it back. 3. Anti-theft solution for laptops Just like tablets and Smartphones, you can even setup anti-theft solution for your laptop. If it is stolen by any chance, you can remotely locate it with Wi- Fi and IP address locations. However, it has to be connected to the Internet. There are also some anti-theft solutions that lets you remotely control the web cam and monitor the screen as well.
  • 3. 4. Perform PC security checks Another very common security loophole that makes us vulnerable is skipping PC security checks. Don’t ignore when your computer prompts for a security or system scan. You just can’t do without an antivirus. It is like trying to drive a car without wheels. Have antivirus, firewall and other security tools in place before working on your computer. 5. Laptop encryption Setting up a password to log in to your PC is the most basic thing and it can easily be bypassed, giving ready access to your files and personal documents. The best thing to do is get your laptop hard drive encrypted. This will stop anyone from removing or bypassing your password, keeping your system safe. 6. USB drive encryption The use of USB and flash drives are quite common today. All you have to do is plug them in and get immediate access to all the files that you need. However, with this flexibility there are also security loopholes that can put all your files at a risk. If you are storing any sensitive documents on external drives, it is best to encrypt them that require a password before the access is given. It is best to go for 256-bit AES encryption. 7. Social network accounts security If you are not paying attention to your social network, then it is just going to be a part of time when you will be taken by malicious links and social apps that try to get access to your personal information or money or even spread spam. And wait, this does not include the privacy issues that come in play. There are different social security apps that help you catch different online threats. Here are some social security apps to check out. 8. Get online backups You already know that you need to create a backup of your computer’s hard drive. But what will you do if the backup disk goes bad? Using an online backup service is a good way to protect your valuable documents, as a
  • 4. second backup. You can select from many antivirus companies providing online backup services to its users. 9. OpenDNS for content filtering Do you think OpenDNS is only for families that have young kids? Other than blocking adult and inappropriate websites, OpenDNS also helps block virus spreading websites and other online threats. The basic level OpenDNS service is free and it applies to both personal computers or even the entire network. 10. Wi-Fi network security Have your Wi-Fi encrypted is one the most important things to do to avoid unwanted visitors on your network. Don’t let people you don’t know get inside your Wi-Fi. If you have a home network then make sure it asks for a password before giving access. This is the simplest step for Wi-Fi encryption. Avoiding these simple security loopholes can help keep you safe and secure in 2013.