As the new year begins, Fred Langa says keep these items in mind to help prevent data theft, identity theft, and private information falling into the wrong hands. These steps will give you 365 days of safe computing.
Even the best antivirus tools can't protect against all the many classes and types of malware that can take over your PC or compromise your data security. But there are many additional tools -- free or low-cost -- that can tie up the remaining loose ends and close off all the most common remaining trouble spots.
Tools like Microsoft's free (and excellent) Antispyware and Javacool's SpywareBlaster can either prevent spyware and other malware from being installed on your PC in the first place; or can help find and eliminate it after the fact.
Tools like StartUpMonitor or WinPatrol can help monitor and prevent attempts by malware to insert itself into your PC's startup sequence.
And tools like Spybot S&D and Ad-Aware can provide focused searches for many kinds of malware.
Some of these tools can even perform multiple functions, combining several kinds of protection into a single tool, and giving you overlapping levels of protection, helping to ensure that anything that might slip by one tool can be caught by another.
Lock It Down
At the simplest level, a good password can help prevent access to your system login or to Administrator-level functions. Or, more securely, you can also encrypt and password-protect your files, folders, or even entire drives on your PC, making them all but immune to snoops and data thieves.
Relatedly, a new, free tool from Microsoft will help you build password-protected limited-access accounts so others may use your PC without undue risk to the privacy or security of your own (or Admin-level) files and privileges. Full information, and the free download, is available here.
With good passwords to limit access to your PC, its accounts, and to your important files and folders, you can achieve the final measure of security, making your system and the information it contains virtually immune to the normal forms of attack.
But Don't Trust: Test
Once your PC is set up with a solid array of protections, take the time to ensure that everything's working as it should. For example, you can test your firewall's ability to prevent common "phone home" attacks with the free "Leaktest". Other free tools also are useful at identifying, testing, and closing some other common attack vectors.
BroadbandReport's fast, free Port Scan tools can help exercise your online defenses in a controlled way, probing for weaknesses.
Building A Mobile Business MindsetAmong 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 18, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."