Software Security Guide For WordPress Users

In this tutorial, we look at ways to tighten software security as part of your WordPress security and overall web security plan.

Software Security Guide For WordPress UsersThis tutorial is part of our tutorial series on WordPress Security. In this tutorial, we look at ways to tighten software security as part of your WordPress security and overall web security plan.

Please also review our WordPress Security Guide For Beginners and our free WordPress Security Checklist.

Important Info

Have you already gone through our tutorials on how to keep your computer device secure? If you have not completed these tutorials yet, we recommend doing so before complete the tutorial series below.

To learn how to keep your computer device secure, see the training module below:

Software Security Guide For WordPress Users

Malicious software (“malware” for short), is a growing problem worldwide.

Once a malicious software program is installed on your computer, it can completely slow down or disrupt your internet connection, track your activity, mine your personal data or business information, destroy your computer, harm your business and cause great problems in your personal life.

Signs that your computer may be affected with malware include a slowing down of your computer, or sluggish performance, even when you only have a few programs running, and extremely slow internet speeds. Typically, this happens because an unauthorized software program or script is taxing your system and using your resources to send out information to other computers.

Malicious software isn’t just found on “nasty” sites. Your computer could also end up hosting bad scripts or viruses simply as a result of having visited reputable sites and agreed to allow certain things to get installed on your computer in exchange for downloading some piece of software or application that you were interested in using.

Preventing malware from infecting and causing damage to your computer requires a combined strategy that includes online security education, using various software protection programs, configuring specific settings on your computer and security software, and general safe web surfing practices.

In this series of tutorials on software security, you are going to learn about the most common types of software-based security threats and how to protect your computer from being infected by malware.

Topics covered in this series include:

Next Step:

Now that we’ve touched briefly on the importance of keeping your computer’s software protected, the next step is to learn what some of the more common types of security threats are.

To learn more about common types of security threats, see the tutorial below:

Software Security Guide For WordPress Users

(Source: Pixabay)

***

"I have used the tutorials to teach all of my clients and it has probably never been so easy for everyone to learn WordPress ... Now I don't need to buy all these very expensive video courses that often don't deliver what they promise." - Stefan Wendt, Internet Marketing Success Group

***

Computer Security Tips

In this tutorial, we provide computer security tips and a downloadable Guide To Basic Computer Security.

Computer Security TipsThis tutorial is part of our tutorial series on WordPress Security. In the previous section of this tutorial, looked at how to keep your computer operating system up-to-date. In this tutorial, we provide computer security tips and a downloadable “Basic Guide To Computer Security”.

Please also review our WordPress Security Guide For Beginners and our free WordPress Security Checklist.

***

Computer Security Tips

In addition to previous sections of this tutorial, the information below will help keep your computer devices safe and protected from hackers.

Password-protect your computer(s)

Your WordPress site can be compromised as simply and as easily as having someone access your computer and steal information containing your site’s login details.

The most basic way to keep your computer safe and protected is to require users to enter a password before being able to access your account.

To learn how to password-protect your computer, see the tutorial below:

Disable hidden filename extensions

By default, the Windows operating system is set to “hide file extensions for known file types”. Change this option so that file extensions do display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that should not be on your computer and you can then investigate further.

To enable/disable file extensions, click on the ‘Start’ button …

Computer Security

Choose ‘Control Panel’ …

Computer Security

In the ‘Control Panel’ screen, select ‘Appearance and Personalization’ …

Computer Security

Locate the ‘Folder Options’ section and click on ‘Show hidden files and folders’ …

Computer Security

In Folder Options > View tab, under ‘Advanced Settings’ find the ‘Hidden files and folders’ options and select ‘Show hidden files, folders and drives’, then click on ‘OK’ to enable this option …

Computer Security

Now, any files, folder and drives that were previously hidden will display in your computer browser screens …

Computer Security

Turn off your computer and disconnect from the network when not using the computer

A hacker cannot attack your computer when you are disconnected from the network or the computer is off.

Consider creating a system image, system repair disk and set system restore points at regular intervals

We’ve covered this earlier in the tutorial, but it’s worth repeating again. System images and repair disks are vital in case your computer is damaged or compromised by a malicious program. Obviously, you need to take these steps before you experience a hostile breach of your system.

Setting system restore points allows you to roll back your system to a previous point in time when everything was working fine (useful in case you install a program that messes up your computer).

To set a system restore point, click on Start > Computer

Computer Security

Click on ‘System properties’ …

Computer Security

In the menu section, click on ‘System protection’ …

Computer Security

In the System Properties > System Protection tab, click the ‘Create’ button to create a system restore point …

Computer Security

When the ‘System Restore’ window opens up, click on ‘Next’ …

Computer Security

Enter a description for your restore point and click the ‘Create’ button …

Computer Security

Your computer will begin to create a restore point …

Computer Security

Once the restore point is create successfully, a notification message will display. Click the ‘Close’ button to continue …

Computer Security

To configure your System Restore settings, repeat the above steps to get to the ‘System protection’ tab, then click on the ‘Configure’ button …

Computer Security

Configure your ‘Restore Settings’ and adjust ‘Disk Space Usage’, then click on ‘OK’ to save your settings …

Computer Security

To restore your system back to a previous restore point, repeat the above process to view the ‘System Protection’ tab, and click on ‘System Restore’ …

Computer Security

Select a restore point from the list displayed in your screen and click ‘Next’ to continue …

Computer Security

Confirm your restore point and click on ‘Finish’ to complete the process …

Computer Security

Your system will be restored to the state it was in previously.

Note: For best results, you should run System Restore from safe mode. If you receive an error while restoring, then restart your computer in safe mode and repeat the process and it should work fine. To get into Safe mode, reboot your computer and hold down the F8 key just before Windows starts up …

Computer Security

Lock your computer if you step away

If you are working around other people and decide to take a break from your computer, lock your computer. Even if you only step away for a few minutes, that’s enough time for someone to access your computer and destroy or steal your information. Locking your computer password-protects your session until you return and prevents anyone else from physically or remotely accessing your information …

Computer Security

Also, if you use laptops, try and keep public use and exposure to a minimum to reduce chances of device theft. Consider using a non-traditional laptop carrying case and an alarm or lock to add additional security.

If Selling Or Giving Your Computer Away …

If you plan to sell, donate, recycle or give your computer or laptop away, you should destroy all data and completely erase everything in your hard drive to ensure that no personal information can be obtained that could compromise your security.

We covered tools that can permanently destroy data on your computer in a previous tutorial (see Harden Your Computer Security).

If you want a total deletion of your hard drive (recommended if you are disposing of your computer), then you should consider using a program called Darik’s Boot and Nuke (DBAN)

DBAN

Darik’s Boot and Nuke (DBAN) is free erasure software designed for consumer use. DBAN is a self-contained boot disk that automatically deletes the contents of any hard disk that it can detect.

Using DBAN to delete everything on your hard drive can help prevent identity theft before recycling a computer. It is also a solution commonly used to remove viruses and spyware from Microsoft Windows installations. DBAN prevents all known techniques of hard disk forensic analysis.

Important

Note: Once you run the program, there is no going back …

DBAN

Important InfoDBAN makes users aware of some product limitations on its site, such as a disclaimer that it cannot guarantee that data will be removed, that it does not provide users with a proof of erasure, such as an audit-ready erasure report, and that it offers limited hardware support and no customer support.

To learn how to password-protect your computer, see the tutorial below:

Some final “common sense” computer security tips …

Use separate computers for business and leisure or personal activities

If possible, avoid using the same computer that you use for business or work, for personal online banking or shopping.

Company-assigned computers can be recalled for maintenance or upgrades, leaving your data exposed to others.

Also, if you have children and you let them use your computer to visit sites they like (e.g. games), you could potentially attract spyware and other risks into your device. Have your children keep a list of any sites they visit and don’t let them register on any web sites without your permission.

Keep your work and personal life on separate computers and you will limit the amount of cookies, spyware and monitoring that can take place, as well as reduce the incidence of identity theft.

Be careful when using public computers

Avoid banking or conducting personal business on public computers at libraries, hotels, and airports. Your online activity could be intercepted or recorded, or someone may be watching your activity and remembering passwords and other personal details.

Stay informed

Subscribe to sites like the National Cyber Alert System at www.us-cert.gov …

US-CertSubscribing to trusted sites that deal with cyber security issues in a timely manner will help you stay informed and proactive when it comes to effectively protecting your home and business computers.

Basic Guide To Computer Security

Download the free Basic Guide To Computer Security below …

[sociallocker id="6498"]Download the Basic Guide To Computer Security[/sociallocker]

Next Step:

Now that you know the basics of keeping your computer device secure, the next step is to learn how to protect your computer from malicious software and software-based security threats.

To learn more about keeping your computer protected from malicious software, see the tutorial below:

Computer Security Tutorials Review …

Computer Security Tips

(Source: Pixabay)

***

"I have used the tutorials to teach all of my clients and it has probably never been so easy for everyone to learn WordPress ... Now I don't need to buy all these very expensive video courses that often don't deliver what they promise." - Stefan Wendt, Internet Marketing Success Group

***

How To Keep Your Computer Operating System Up-To-Date

Learn how to keep your computer operating system up-to-date.

How To Keep Your Computer Operating System Up-To-DateThis tutorial is part of our tutorial series on WordPress Security. In the previous section of this tutorial, we looked at ways to harden your computer system. In this tutorial, you will learn how to keep your computer operating system up-to-date.

Please also review our WordPress Security Guide For Beginners and our free WordPress Security Checklist.

***

How To Keep Your Computer Operating System Up-To-Date

One of the main reasons why software companies and device manufacturers update their operating system software, drivers, etc. other than to fix bugs or introduce new features, is to address security vulnerabilities whenever these are discovered.

Computer Security

If you are not keeping your operating system and other important software on your computer up-to-date, then you are basically leaving your system vulnerable to attack by anyone who knows how to exploit the vulnerabilities of older software versions.

WordPress site security involves keeping computer systems up-to-date. It is important, therefore, to install all updates and apply all patches released for your operating system, web browser and computer software frequently.

Updating Your Current Operating System

If you use the Windows operating system, click on the ‘Start’ button …

Computer Security

Click on ‘All Programs’ …

Computer Security

From the list of programs, click on ‘Windows Update’ …

Computer Security

If your system files are out of date, you will see a notification message similar to the one shown in the screenshot below. Click on the ‘Install updates’ button to install the latest updates for your computer …

Computer SecurityYou can check for updates manually, or allow Windows to perform updates automatically by clicking on ‘Change settings’ in the section’s menu …

Computer SecurityConfigure the options in this section and click on the ‘OK’ button at the bottom of the screen when finished to update your settings …

Computer Security

Upgrading To A Different Operating System

To check whether your system can be upgraded to a different operating system, click on the ‘Windows Anytime Upgrade’ link at the bottom of the ‘Windows Update’ screen …

Computer Security

You can then follow the prompts to learn about your upgrade options …

Computer Security

You can also visit the Windows Upgrade Advisor site, where you can download and install a software program that will scan your site for potential issues and advise you what to do before upgrading …

Computer Security

For more information about upgrading your computer, visit the sites below:

Next Step:

Now that you know how to keep your computer’s operating system up-to-date, the next step is to review some additional computer security tips.

For additional computer security tips, see the tutorial below:

See Also …

How To Keep Your Computer Operating System Up-To-Date

(Source: Pixabay)

***

"This is AMAZING! I had learnt about how to use WordPress previously, but this covers absolutely everything and more!! Incredible value! Thank you!" - Monique, Warrior Forum

***