In the 21st century, computers have changed the way we function in our daily lives. With changing the fundamental approach to almost everything we, as a society, do the computer has solidified its status as a world altering invention. This invention, at its genesis, was intended for making calculations and performing simple tasks. In the past decade much more has been intertwined in the ability of what computers can do. These systems can surf the web, access websites to buy things, use search engines to learn things, even professional trade softwares are created and implemented onto computers to assist in different work environments. However, all of these innovations come with a price. This price usually comes in the form of vulnerability to a computer owner’s personal security. Cyber crime is at an all time high due to navigating a computer through a secured network. Large businesses and corperations experience hackers that sail through their secured network to obtain information that could put the company in jeopardy. On a much more personal scale a simple computer connection to a public network has been known to provide the opportunity for threats to learn and make use of an individual’s personal information. These regular security breaches have led to certain security standards and practices which construct a baseline for protecting personal information and increase in security as the value of the information being handled goes up as well. One of these practices is to be up to date on computer and software updates as the latest and most likely safest versions will assist to keep information safe. Another way of ensuring computer security consists of permanently deleting files from the computer hard drive. The longer files sit on a computer, the more at risk they become to a breach. A third and final way of checking the security of a computer can be checking social media settings and making sure they are far away from leaving an individual at risk for someone obtaining particular information that leaves the user in a vulnerable state.