Computer security is very important for protecting yourself against data theft in todays online world. Below are a few steps we have put togeter that you can take to help secure your computer.
Enable automatic software updates
Software and hardware vendors will release patches for their hardware and software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to obtain updates from the vendor's website. Read the manuals or browse the vendor's website for more information on how you can keep your hardware and software updated.
Some software applications will automatically check for available updates, and many vendors offer automatic notification of updates via a mailing list. Again, look on your vendor's website for information about automatic notification. If no mailing list or other automated notification mechanism is offered, you may need to check the vendor's website periodically for updates.
Install and use antivirus software
While an up-to-date antivirus software package cannot protect against all malicious code, for most users it remains the best defense against malicious code attacks. Many antivirus packages support automatic updates of virus definitions. We recommend using these automatic updates when available. The good news is that Windows 10 comes with antivirus built into it. You can also use a great product called Malwarebytes
Avoid unsafe behavior
Use caution when opening email attachments, be careful when visiting unknown websites, instant messaging, or chat rooms, and avoid using peer-to-peer file-sharing software. Never enable file sharing on network interfaces exposed directly to the Internet.
Follow the principle of least privilege — Do not enable it if you don't need it
Consider creating and using an account with limited privileges instead of an 'administrator' or 'root' level account for everyday tasks. Depending on the operating system, you only need to use administrator-level access when installing new software, changing system configurations, etc. Many vulnerability exploits (viruses, Trojan horses, malware) are executed with the privileges of the user that runs them, making it far riskier to be logged in as an administrator all the time.