The days of online security being primarily
the concern of corporate, financial or government institutions
has long past. Today, any person or enterprise with
a PC and Internet access are under threat of imminent
attack or compromise. If you are currently using the
Internet or are about to connect for the first time,
following these steps will help reduce your vulnerability.
Connecting to the Internet
Having implemented the steps outlined on the
previous
page, you are ready to connect to the Internet.
If you are already a PC user and online, please review
the steps from the
previous
page before you continue.
At this point, you will connect to the internet through
a broadband or dial-up connection. Follow any instructions
provided by your Internet Service Provider. Once a connection
is established, we recommend the following steps be
performed in the order given.
1.) First priority will be to
visit the
Windows
Update site, scan your computer and install any
Critical Updates and Service Packs listed in
the scan results.
2.) Update your Anti-virus software
(
see your software documentation). It is crucial
that Anti-virus software be updated on a regular basis.
Most software includes an automatic update option; enabling
this option is strongly suggested.
3.) If you are using third-party
software for your firewall solution, consult your documentation,
or the vendor website, for the proper updating procedure.
Software manufactures often update their products in
response to security and usability issues.
4.) If your machine came with
Microsoft Outlook or Works installed, you should visit
Office
Update and install any
Security or Service Pack
updates that are needed.
We now have the basics in place, but it does not end
here! In order to stay secure you must remain vigilant.
Update your anti-virus software at least once a week,
check
Windows
Update on a regular basis and check with your firewall
vendor for any new patches or updates.
Even with the proper updates, antivirus software and
firewall in place, you may not be adequately protected
unless everything is correctly configured. The next
step will be testing your configuration for vulnerabilities
using some free online tools.
If you have any questions that need immediate resolution,
please feel free to contact us via
email
or use our online form.