Journal #8

You can tell your computer is safe by determining what you have that needs protecting. The very first thing you can do in the process is to assess what internet-enabled devices you have. for example, if you have a computer, laptop, tablet, and smartphone. Those should have at least some basic security tools on them, including an anti-malware file scanner, password, or a passcode to protect the computer from being hacked or being swiped by other users. A virus or malware has a negative impact, but the degree of the infection. Here are some of the possible consequences of computer infection. When it comes to preventing computer viruses or malware infections, you should always be proactive. The following best practices are just some ways you can work to make sure your computer remains free of malware and viruses. One of the main ways viruses gain access to a system is through security lapses in existing software. Furthermore, the first step to preventing your computer from getting infected in the first place, you should make sure that your applications, antivirus software, and operating system are up to date. This is important when it comes to your operating a system. Since Apple, Microsoft, and other providers regularly release security patches to deal with potential weaknesses. You can reduce the number of potential vulnerabilities for cybercriminals to exploit by uninstalling applications you won’t use. most modern antivirus software has automation features that let you set a specific time for the computer to conduct its virus scan. By setting the process for a time where you don’t need to use the computer. you can make sure your system is safe without it hindering your productivity. If you’re dealing with pop us your computer, you can take these steps to address them, according to Kaspersky.

work cited

Scott Cook cyse200, https://sites.wp.odu.edu/cyber200scottcook/2020/04/08/how-has-cyber-technology-created-opportunities-for-workplace-deviance/.

Leave a Reply

Your email address will not be published. Required fields are marked *