Summary of Personal Computer Information Security Protection Solutions

Source: Internet
Author: User

 

We no longer need to ensure the absolute security of our own networks, prevent viruses, and completely prevent hackers. With our understanding, we need to face frequent cyberattacks, how can we minimize the losses suffered.

In the face of the ever-increasing information security environment, we no longer need to ensure the absolute security of our networks, prevent viruses, and completely prevent hackers, what we need is to minimize the loss caused by the frequent occurrence of network attacks, and even pay more attention to data restoration after being attacked. Can enterprise data files and personal privacy be automatically damaged after they leave their network environment? Therefore, for personal computer security issues, I will summarize some common security solutions for your reference.

 

I. Classification and classification of local information

 

To manage personal information, you must first classify your personal information, including emails, documents (DOC, XLS, PPT, PDF, TXT), and files (other types), photo files, video files, etc.

 

The information is classified into three levels according to the security level. The most confidential information is "top secret", followed by "secret", and non-confidential files are "common ".

 

Ii. Account Security

 

The system is not added to the domain. Only one administrator is set on the local computer and a password is set. A password is required to log on to the system. A common network service account also needs a password to log on, for more information about the security of passwords for local computers and network service accounts, see the "Security Measures for ten common network passwords" in another article published by moonlight blog.

 

Currently, the network service is the safest to use Google services. users need to have two Google accounts, one of which is their most commonly used Google accounts, used for normal and confidential email or file operations, use this account to contact you. The other is a top-secret Google account. All emails and documents defined as "top-secret" information are stored in this top-secret Google account, and no information is retained on the local computer, do not save the password of a top secret Google account to your local device. You can only access this top secret Google account in the invisible window or private mode.

 

Iii. Routine operations

 

The file processing tools are mail-Gmail, documentation-Google Docs, instant messaging-Gtalk (built-in Gmail), and other files-Dropbox, TC, and WinRAR.

 

In daily file operations, you should try to use the network services of large foreign companies and use the data export function to avoid data loss caused by service shutdown. Therefore, Google's service is recommended.

 

Emails and documents should be placed on the server as much as possible, and email clients should be used as little as possible, and Gmail and Google Docs services should be used.

 

A large number of files can be saved using cloud storage services such as Dropbox. Files with top secret information can also be synchronized using another Dropbox account. After synchronization, close Dropbox and delete local files. If you need to back up secret or top secret files locally, you need to use file encryption technology. The simplest method is to use WinRAR and other tools to compress the password and set a long password with more than 8 characters.

 

Iv. Emergency Handling steps

 

When your computer is lost or your computer is irretrievable, how should you perform emergency operations to prevent personal information from being acquired by others.

 

First of all, the most important thing is to immediately change the password of a commonly used Google account. You can click here to modify the password on your browser, or you can log on to Google to change the password on your mobile phone browser. The password of the top secret Google account is not stored locally and is always accessed in private mode, so it is relatively secure.

 

Next, modify the Dropbox password and log on to the Dropbox to disconnect the lost PC permission to prevent others from modifying your network files.

 

Then, modify the passwords of other network applications, such as SNS, microblogs, and blogs. The passwords are usually stored locally, the user must log on again to access the service.

 

The above is my summary based on common security solutions and I hope to help you.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.