We no longer need to ensure the absolute security of our own networks, prevent viruses, and completely prevent hackers. With our understanding, we need to face frequent cyberattacks, how can we minimize the losses suffered.
In the face of the ever-increasing information security environment, we no longer need to ensure the absolute security of our networks, prevent viruses, and completely prevent hackers, what we need is to minimize the loss caused by the frequent occurrence of network attacks, and even pay more attention to data restoration after being attacked. Can enterprise data files and personal privacy be automatically damaged after they leave their network environment? Therefore, for personal computer security issues, I will summarize some common security solutions for your reference.
I. Classification and classification of local information
To manage personal information, you must first classify your personal information, including emails, documents (DOC, XLS, PPT, PDF, TXT), and files (other types), photo files, video files, etc.
The information is classified into three levels according to the security level. The most confidential information is "top secret", followed by "secret", and non-confidential files are "common ".
Ii. Account Security
The system is not added to the domain. Only one administrator is set on the local computer and a password is set. A password is required to log on to the system. A common network service account also needs a password to log on, for more information about the security of passwords for local computers and network service accounts, see the "Security Measures for ten common network passwords" in another article published by moonlight blog.
Currently, the network service is the safest to use Google services. users need to have two Google accounts, one of which is their most commonly used Google accounts, used for normal and confidential email or file operations, use this account to contact you. The other is a top-secret Google account. All emails and documents defined as "top-secret" information are stored in this top-secret Google account, and no information is retained on the local computer, do not save the password of a top secret Google account to your local device. You can only access this top secret Google account in the invisible window or private mode.
Iii. Routine operations
The file processing tools are mail-Gmail, documentation-Google Docs, instant messaging-Gtalk (built-in Gmail), and other files-Dropbox, TC, and WinRAR.
In daily file operations, you should try to use the network services of large foreign companies and use the data export function to avoid data loss caused by service shutdown. Therefore, Google's service is recommended.
Emails and documents should be placed on the server as much as possible, and email clients should be used as little as possible, and Gmail and Google Docs services should be used.
A large number of files can be saved using cloud storage services such as Dropbox. Files with top secret information can also be synchronized using another Dropbox account. After synchronization, close Dropbox and delete local files. If you need to back up secret or top secret files locally, you need to use file encryption technology. The simplest method is to use WinRAR and other tools to compress the password and set a long password with more than 8 characters.
Iv. Emergency Handling steps
When your computer is lost or your computer is irretrievable, how should you perform emergency operations to prevent personal information from being acquired by others.
First of all, the most important thing is to immediately change the password of a commonly used Google account. You can click here to modify the password on your browser, or you can log on to Google to change the password on your mobile phone browser. The password of the top secret Google account is not stored locally and is always accessed in private mode, so it is relatively secure.
Next, modify the Dropbox password and log on to the Dropbox to disconnect the lost PC permission to prevent others from modifying your network files.
Then, modify the passwords of other network applications, such as SNS, microblogs, and blogs. The passwords are usually stored locally, the user must log on again to access the service.
The above is my summary based on common security solutions and I hope to help you.