top of page

Security Issues

There are several digital-security risk areas, depending on the context. We will look at the digital-security risk areas associated with information, Internet, computers and physical locations

 

security tools and methods

 

1. Protection for devices from malware and hackers:

Use antivirus software and ensure that you run software updates regularly. There are many free tools available such as Avast, Spybot and Comodo Firewall that will help you protect your devices.

2. Protect your information:

Anything can happen, despite your best efforts to protect your information. Key is to ensure that you back up your information both on physical devices and secure cloud services. Moreover, you should maintain a healthy computer environment. There is a reason computer labs dictate no food and drinks being permissible nearby… this is to prevent human error where a drink spills on the device or food condiments drip into it.

 

3. Creating and maintaining secure passwords:

Use a secure password database tool, such as KeePass; it will greatly support your method of maintaining secure passwords. Using alphas, numeric and symbols are a great way to make your password ‘unhackable’.

4. Protecting sensitive files on your computer:

Having a multi-layer defence is the best you can do to protect your data and device. Make sure you practice points 1 and 2, but also encrypt those files that contain sensitive data.

5. Keeping your Internet communication private:

The suggestion of keeping your communication private is not for illegal purposes, but to protect your communication from being stolen. There are various guidelines and software available to help you protect your digital communication. One such option is having a Virtual Private Network (VPN). Other options include RiseUp, an email service, Off The Record, a plugin for instant messaging, as well as other browser plugins that protect your online communications.

6. How to remain anonymous and bypass censorship on the Internet:

The purpose for deploying protective measures in this instance may be due to the scenario you face within the country that you live in or come from. In many countries, the Internet is controlled and monitored and therefore limiting the citizens in their education, their ability to be informed consumers, as well as their freedom of speech and expression. Although this may not apply to you in the country you currently reside in, you may find yourself moving to a country where this is the norm. Some of the Middle Eastern countries do this, and South Africans are flocking to these countries to enjoy employment that is often tax-free. There are two methods that will enable you to bypass installed software that prevents certain websites being accessed: Censorship Circumvention and Circumvention Proxies.

© 2023 by The Artifact. Proudly created with Wix.com

  • Facebook B&W
  • Twitter B&W
  • Instagram B&W
bottom of page