{"id":1560,"date":"2019-10-14T22:07:00","date_gmt":"2019-10-14T11:07:00","guid":{"rendered":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/2019\/10\/14\/the-basics-of-computer-security\/"},"modified":"2019-10-14T22:07:00","modified_gmt":"2019-10-14T11:07:00","slug":"the-basics-of-computer-security","status":"publish","type":"post","link":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/2019\/10\/14\/the-basics-of-computer-security\/","title":{"rendered":"The basics of computer security"},"content":{"rendered":"<div class=\"text-image-parent section\">\n<div class=\"text-image clear-div  small-business-styles\">\n<div class=\"text\">\n<p>\u00a0<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"text-image-parent section\">\n<div class=\"text-image clear-div  small-business-styles\">\n<div class=\"text\">\n<p>Many cyber security incidents can be prevented by applying basic computer security practices, controls and software programs.<\/p>\n<p>Here are the minimum steps you need to take to improve your cyber resilience.<\/p>\n<h2>Keep your business computer for business use only<\/h2>\n<p>If the computer you use for business is shared with family members or used for social media, playing games, watching videos and downloading music, there\u2019s a higher chance of it being exposed to malicious software. Even with separate logins, there is still the possibility that another user of the computer may unintentionally download a virus or malicious software to the computer itself, which can affect your business information. It is good practice to have a dedicated computer for business use.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" height=\"300\" src=\"http:\/\/internal.clientcommunity.com.au\/uploaded\/level\/1285\/mlc-saftey.jpg\" width=\"570\" \/><\/p>\n<h2>Always keep your operating system and applications up to date\u00a0<\/h2>\n<p>An Operating System (OS) manages all the software and hardware on a computer system. The most common types of OS are Microsoft\u2019s Windows platform or Apple\u2019s Mac OS X. It\u2019s good practice to upgrade your operating system when new versions become available. This is because the OS upgrades include enhanced security features and bug fixes.<\/p>\n<p>Security vulnerabilities and bugs are emerging all the time. You can set up automatic updates and installations of the latest updates to keep your operating system protected.<\/p>\n<p>Find out more about keeping your operating systems, applications and internet browsers up to date by reading\u00a0<a href=\"https:\/\/www.nab.com.au\/about-us\/security\/cyber-safety-tips-for-your-business\/how-to-protect-your-business-from-cyber-security-threats\" target=\"_blank\" rel=\"noopener noreferrer\">How to protect your business from cyber security threats<\/a>.<\/p>\n<h2>Install a firewall to block unwelcome access<\/h2>\n<p>A firewall is a protective security system that monitors and manages traffic between your computer network and the internet. It filters traffic types that can reach your network based on a set of defined security rules. If incoming traffic breaches a security rule, that traffic will be blocked from reaching your network.<\/p>\n<p>Search the support pages of\u00a0<a class=\"external-link\" href=\"https:\/\/www.microsoft.com\/en-us\/safety\/pc-security\/firewalls-whatis.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>\u00a0and\u00a0<a class=\"external-link\" href=\"https:\/\/support.apple.com\/en-au\" target=\"_blank\" rel=\"noopener noreferrer\">Apple iOS<\/a>\u00a0for information about firewalls for your operating system.<\/p>\n<h2>Keep your anti-virus and malware protection up to date\u00a0<\/h2>\n<p>Anti-virus software is a tool to protect your computer or network from cyber security threats. Cyber security threats include\u00a0<a href=\"https:\/\/www.nab.com.au\/about-us\/security\/cyber-safety-tips-for-you\/easy-ways-to-protect-your-computer-from-malware\" target=\"_blank\" rel=\"noopener noreferrer\">malware being installed on your network<\/a>. If a threat is detected, you receive an alert along with the recommended action you need to take.<\/p>\n<p>Operating systems offer inbuilt anti-virus and malware protection. The key to staying protected is to install updates as soon as they are available.<\/p>\n<p>Search the support pages of\u00a0<a class=\"external-link\" href=\"https:\/\/support.microsoft.com\/en-au\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>\u00a0and\u00a0<a class=\"external-link\" href=\"https:\/\/support.apple.com\/en-au\/ios\" target=\"_blank\" rel=\"noopener noreferrer\">Apple iOS<\/a>\u00a0to find out more. Alternatively you can ask your trusted IT retailer or IT support for recommendations.<\/p>\n<h2>Protect your data with encryption\u00a0<\/h2>\n<p>Encryption software protects your data by disguising it in a code that unauthorised people can\u2019t view, even if they have physical access it. Search the\u00a0<a class=\"external-link\" href=\"https:\/\/support.microsoft.com\/en-au\/help\/4028713\/windows-turn-on-device-encryption\" target=\"_blank\" rel=\"noopener noreferrer\">support pages of Microsoft<\/a>\u00a0or\u00a0<a class=\"external-link\" href=\"https:\/\/support.apple.com\/en-au\/HT202303\" target=\"_blank\" rel=\"noopener noreferrer\">Apple security<\/a>\u00a0to find out how to turn on encryption for data security.<\/p>\n<h2>Keep passwords strong and secured<\/h2>\n<p>Always have unique strong passwords for all your online accounts and logins. Never share passwords amongst business colleagues or family.<\/p>\n<h2>Set up two factor authorisation (2FA)<\/h2>\n<p>Over and above using strong passwords, add an additional layer of security by choosing 2FA. This is particularly important if you have staff accessing your systems remotely. Secure apps such as internet banking with 2FA.<\/p>\n<ul>\n<li>\n<p>For more information, check out\u00a0<a href=\"https:\/\/www.nab.com.au\/about-us\/security\/cyber-safety-tips-for-you\/six-simple-ways-to-protect-your-passwords\" target=\"_blank\" rel=\"noopener noreferrer\">6 simple ways to protect your passwords<\/a>.<\/p>\n<\/li>\n<\/ul>\n<h2>Uninstall programs that are not used\u00a0<\/h2>\n<p>Get into the practice of checking what programs are installed on your systems. Uninstall any software program that you don\u2019t need as you may be unnecessarily opening yourself up to security vulnerabilities.<\/p>\n<p>Also, by getting familiar with the programs that you expect to see, any unwelcome or malicious programs will stand out.<\/p>\n<h2>Be vigilant on access management<\/h2>\n<ul>\n<li>\n<p>Employees in your business should have their own login credentials to business systems.<\/p>\n<\/li>\n<li>\n<p>Remove administration rights from computers that don\u2019t need it.<\/p>\n<\/li>\n<li>\n<p>Don\u2019t browse the internet using an administration account. This prevents the entire network from becoming infected if a compromised website is visited.<\/p>\n<\/li>\n<li>\n<p>Ask your IT provider if they have remote access to your systems and what security controls they have in place.<\/p>\n<\/li>\n<li>\n<p>Ask your IT provider if they use different passwords for each of their customers\u2019 sites.<\/p>\n<\/li>\n<\/ul>\n<h2>Back up your data regularly<\/h2>\n<p>If your system is compromised, you\u2019re at risk of losing all your business data. Make sure you back up your data regularly. To find out how read the article\u00a0<a href=\"https:\/\/www.nab.com.au\/about-us\/security\/cyber-safety-tips-for-your-business\/safely-storing-your-data\" target=\"_blank\" rel=\"noopener noreferrer\">How to store your business data securely<\/a>.<\/p>\n<h2>For\u00a0 more information about basic computer security\u00a0<\/h2>\n<ul>\n<li>\n<p>Australian Signals Directorate (ASD) &gt;\u00a0<a class=\"external-link\" href=\"https:\/\/www.asd.gov.au\/infosec\/mitigationstrategies.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Strategies to mitigate cyber security incidents<\/a><\/p>\n<\/li>\n<li>\n<p>Australian Cybercrime Online Reporting Network (ACORN) &gt;\u00a0Protect and Prevent<\/p>\n<\/li>\n<li>\n<p>Australian Cyber Security Centre (ACSC) &gt;\u00a0<a class=\"external-link\" href=\"https:\/\/acsc.gov.au\/incident.html\" target=\"_blank\" rel=\"noopener noreferrer\">Report a Cyber Security Incident<\/a><\/p>\n<\/li>\n<li>\n<p>Australian Competition &amp; Consumer Commission &gt;\u00a0<a class=\"external-link\" href=\"https:\/\/www.scamwatch.gov.au\/\" target=\"_blank\" rel=\"noopener noreferrer\">Scamwatch<\/a><\/p>\n<\/li>\n<li>\n<p>Stay Smart Online &gt;\u00a0<a class=\"external-link\" href=\"https:\/\/www.staysmartonline.gov.au\/protect-your-business\" target=\"_blank\" rel=\"noopener noreferrer\">Protect your business<\/a><\/p>\n<\/li>\n<\/ul>\n<p><span style=\"font-size: 10px\"><a href=\"https:\/\/www.nab.com.au\/about-us\/security\/cyber-safety-tips-for-your-business\/the-basics-of-computer-security\" target=\"_blank\" rel=\"noopener noreferrer\">Source : Nab November 2019\u00a0<\/a><\/span><\/p>\n<h3 class=\"heading active\"><span style=\"font-size: 10px\">Information, resources and tools<\/span><\/h3>\n<div class=\"content\">\n<div class=\"Helpful online information, resources and tools parsys\">\n<div class=\"text-image-parent section\">\n<div class=\"text-image clear-div  small-business-styles\">\n<div class=\"text\">\n<p><span style=\"font-size: 10px\">Australian Government | Stay Smart Online<\/span><\/p>\n<p><span style=\"font-size: 10px\">Stay Smart Online provides topical, relevant and timely information on how home internet users and small businesses can protect themselves from, and reduce the risk of, cyber security threats such as software vulnerabilities, online scams, malicious activities, and risky online behaviours.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 10px\"><a class=\"external-link button-anchor \" href=\"https:\/\/www.staysmartonline.gov.au\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.staysmartonline.gov.au\/<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 10px\">Australian Government | Australian Cyber Security Centre<\/span><\/p>\n<p><span style=\"font-size: 10px\">The Australian Cyber Security Centre (ACSC) brings cyber security capabilities from across the Australian Government together into a single location. It is the hub for private and public sector collaboration and information-sharing to combat cyber security threats.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 10px\"><a class=\"external-link button-anchor \" href=\"https:\/\/acsc.gov.au\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/acsc.gov.au\/<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 10px\">An Australian Government initiative | Australian Cybercrime Online Reporting Network (ACORN)<\/span><\/p>\n<p><span style=\"font-size: 10px\">ACORN is a secure reporting and referral service for cyber crime and online incidents which may be in breach of Australian law. The ACORN website provides a cyber crime reporting mechanism as well as helpful information about cyber crime.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 10px\"><a class=\"external-link button-anchor \" href=\"https:\/\/www.acorn.gov.au\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.acorn.gov.au\/<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 10px\">Australian Competition and Consumer Commission | Scamwatch<\/span><\/p>\n<p><span style=\"font-size: 10px\">Scamwatch provides information to consumers and small businesses about how to recognise, avoid and report scams using publications, videos and other online resources.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 10px\"><a class=\"external-link button-anchor \" href=\"https:\/\/www.scamwatch.gov.au\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.scamwatch.gov.au\/<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 10px\">Australian Government | Office of the eSafety Commissioner<\/span><\/p>\n<p><span style=\"font-size: 10px\">The Office of the eSafety Commissioner provides online safety education for Australian children and young people, a complaints service for young Australians who experience serious cyberbullying, and address illegal online content.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 10px\"><a class=\"external-link button-anchor \" href=\"https:\/\/esafety.gov.au\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/esafety.gov.au\/<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 10px\">Australian Government | Attorney-General\u2019s Department<\/span><\/p>\n<p><span style=\"font-size: 10px\">The Attorney-General\u2019s Department website provides helpful information and resources about your rights and protections in regards to identity security, freedom of information and cyber security. The Department has developed a range of resources to assist people protect their identity and recover from the effects of identity crime.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 10px\"><a class=\"external-link button-anchor \" href=\"https:\/\/www.ag.gov.au\/RightsAndProtections\/Pages\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.ag.gov.au\/RightsAndProtections\/Pages\/default.aspx<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 10px\">National Australia Bank Limited. ABN 12 004 044 937 AFSL and Australian Credit Licence 230686. MLC Limited uses the MLC brand under licence. MLC Limited is a part of the Nippon Life Insurance Group and not part of the NAB Group of Companies. The information contained in this article is intended to be of a general nature only. Any advice contained in this article has been prepared without taking into account your objectives, financial situation or needs. Before acting on any advice on this website, NAB recommends that you consider whether it is appropriate for your circumstances.<\/span><\/p>\n<p><span style=\"font-size: 10px\">Important:<\/span><br \/><span style=\"font-size: 10px\">Any information provided by the author detailed above is separate and external to our business and our Licensee. Neither our business nor our Licensee takes any responsibility for any action or any service provided by the author.<\/span><\/p>\n<p><span style=\"font-size: 10px\">Any links have been provided with permission for information purposes only and will take you to external websites, which are not connected to our company in any way. Note: Our company does not endorse and is not responsible for the accuracy of the contents\/information contained within the linked site(s) accessible from this page.<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 Many cyber security incidents can be prevented by applying basic computer security practices, controls and software programs. Here are the minimum steps you need to take to improve your cyber resilience. Keep your business computer for business use only If the computer you use for business is shared with family members or used for [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[19],"tags":[],"class_list":{"0":"post-1560","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-general-articles","7":"entry"},"_links":{"self":[{"href":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/wp-json\/wp\/v2\/posts\/1560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/wp-json\/wp\/v2\/comments?post=1560"}],"version-history":[{"count":0,"href":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/wp-json\/wp\/v2\/posts\/1560\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/wp-json\/wp\/v2\/media?parent=1560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/wp-json\/wp\/v2\/categories?post=1560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gpadviser.com.au\/gpl-theme-1-2015\/wp-json\/wp\/v2\/tags?post=1560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}