Digital Literacy
Kaity Rechenmacher
Security and Privacy
Two main issues in today's society is security and privacy for ourselves, including our devices. Computer security references to the intrusion of others to your devices. Computer privacy retains to how many and which companies you have given your information to. This flyer will give a loose explanation of what threats there are and what measures to take to avoid them.
Natural Threats
Measures for Protection---
Backup Data- making sure to backup your data on a consistent basis could ultimately save all of your information you have saved on your computer and life.
Install Protective Electrical Devices- theses devises, such as the Uninterruptible Power Supply (UPS) can save your battery or help provide a charge if a power surge were to come through. However, during a major storm you should turn off your device, for the sake of its safety.
Insulate devices from fire- make sure to place device in fire retardant surroundings. This should, in theory, protect your device and your personal information.
Maintain appropriate temperatures and humidity- maintaining average temperature and humidity is important to the life of your device. If consistently exposed to extreme temperatures and always in heavy humidity, this can cause multiple malfunctions and ultimately shorten the life of your device drastically.
Humans can be a threat to our computer security too....
What can we do to avoid human threats?
You can avoid these things by storing your data safely, and backing it up.
Installing antivirus and antispyware programs to protect you from viruses and any type pf spyware.
Install a firewall to help prevent hackers from entering your systems and security. This acts as a huge brick wall, making an obstacle for hackers.
And finally, keep your computer in a safe environment. Meaning, don't leave it outing the open, and definitely don't leave it with people you don't think you can trust. Limiting the number of individuals that have access to your files, can prevent the number of incidences of hacking.