Computer Security Tips

In this tutorial, we provide computer security tips and a downloadable Guide To Basic Computer Security.

Computer Security TipsThis tutorial is part of our tutorial series on WordPress Security. In the previous section of this tutorial, looked at how to keep your computer operating system up-to-date. In this tutorial, we provide computer security tips and a downloadable “Basic Guide To Computer Security”.

Please also review our WordPress Security Guide For Beginners and our free WordPress Security Checklist.


Computer Security Tips

In addition to previous sections of this tutorial, the information below will help keep your computer devices safe and protected from hackers.

Password-protect your computer(s)

Your WordPress site can be compromised as simply and as easily as having someone access your computer and steal information containing your site’s login details.

The most basic way to keep your computer safe and protected is to require users to enter a password before being able to access your account.


We have created a separate tutorial that shows you how to password-protect your computer.

help To learn how to password-protect your computer, see the tutorial below:

redarrow Computer Password Security

Disable hidden filename extensions

By default, the Windows operating system is set to “hide file extensions for known file types”. Change this option so that file extensions do display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that should not be on your computer and you can then investigate further.

To enable/disable file extensions, click on the ‘Start’ button …

Computer Security

Choose ‘Control Panel’ …

Computer Security

In the ‘Control Panel’ screen, select ‘Appearance and Personalization’ …

Computer Security

Locate the ‘Folder Options’ section and click on ‘Show hidden files and folders’ …

Computer Security

In Folder Options > View tab, under ‘Advanced Settings’ find the ‘Hidden files and folders’ options and select ‘Show hidden files, folders and drives’, then click on ‘OK’ to enable this option …

Computer Security

Now, any files, folder and drives that were previously hidden will display in your computer browser screens …

Computer Security

Turn off your computer and disconnect from the network when not using the computer

A hacker cannot attack your computer when you are disconnected from the network or the computer is off.

Consider creating a system image, system repair disk and set system restore points at regular intervals

We’ve covered this earlier in the tutorial, but it’s worth repeating again. System images and repair disks are vital in case your computer is damaged or compromised by a malicious program. Obviously, you need to take these steps before you experience a hostile breach of your system.

Setting system restore points allows you to roll back your system to a previous point in time when everything was working fine (useful in case you install a program that messes up your computer).

To set a system restore point, click on Start > Computer

Computer Security

Click on ‘System properties’ …

Computer Security

In the menu section, click on ‘System protection’ …

Computer Security

In the System Properties > System Protection tab, click the ‘Create’ button to create a system restore point …

Computer Security

When the ‘System Restore’ window opens up, click on ‘Next’ …

Computer Security

Enter a description for your restore point and click the ‘Create’ button …

Computer Security

Your computer will begin to create a restore point …

Computer Security

Once the restore point is create successfully, a notification message will display. Click the ‘Close’ button to continue …

Computer Security

To configure your System Restore settings, repeat the above steps to get to the ‘System protection’ tab, then click on the ‘Configure’ button …

Computer Security

Configure your ‘Restore Settings’ and adjust ‘Disk Space Usage’, then click on ‘OK’ to save your settings …

Computer Security

To restore your system back to a previous restore point, repeat the above process to view the ‘System Protection’ tab, and click on ‘System Restore’ …

Computer Security

Select a restore point from the list displayed in your screen and click ‘Next’ to continue …

Computer Security

Confirm your restore point and click on ‘Finish’ to complete the process …

Computer Security

Your system will be restored to the state it was in previously.

Note: For best results, you should run System Restore from safe mode. If you receive an error while restoring, then restart your computer in safe mode and repeat the process and it should work fine. To get into Safe mode, reboot your computer and hold down the F8 key just before Windows starts up …

Computer Security

Lock your computer if you step away

If you are working around other people and decide to take a break from your computer, lock your computer. Even if you only step away for a few minutes, that’s enough time for someone to access your computer and destroy or steal your information. Locking your computer password-protects your session until you return and prevents anyone else from physically or remotely accessing your information …

Computer Security

Also, if you use laptops, try and keep public use and exposure to a minimum to reduce chances of device theft. Consider using a non-traditional laptop carrying case and an alarm or lock to add additional security.

If Selling Or Giving Your Computer Away …

If you plan to sell, donate, recycle or give your computer or laptop away, you should destroy all data and completely erase everything in your hard drive to ensure that no personal information can be obtained that could compromise your security.

We covered tools that can permanently destroy data on your computer in a previous tutorial (see Harden Your Computer Security).

If you want a total deletion of your hard drive (recommended if you are disposing of your computer), then you should consider using a program called Darik’s Boot and Nuke (DBAN)


Darik’s Boot and Nuke (DBAN) is free erasure software designed for consumer use. DBAN is a self-contained boot disk that automatically deletes the contents of any hard disk that it can detect.

Using DBAN to delete everything on your hard drive can help prevent identity theft before recycling a computer. It is also a solution commonly used to remove viruses and spyware from Microsoft Windows installations. DBAN prevents all known techniques of hard disk forensic analysis.


Note: Once you run the program, there is no going back …


Important InfoDBAN makes users aware of some product limitations on its site, such as a disclaimer that it cannot guarantee that data will be removed, that it does not provide users with a proof of erasure, such as an audit-ready erasure report, and that it offers limited hardware support and no customer support.

help To learn how to password-protect your computer, see the tutorial below:

redarrow Darik’s Boot and Nuke (DBAN)

Some final “common sense” computer security tips …

Use separate computers for business and leisure or personal activities

If possible, avoid using the same computer that you use for business or work, for personal online banking or shopping.

Company-assigned computers can be recalled for maintenance or upgrades, leaving your data exposed to others.

Also, if you have children and you let them use your computer to visit sites they like (e.g. games), you could potentially attract spyware and other risks into your device. Have your children keep a list of any sites they visit and don’t let them register on any web sites without your permission.

Keep your work and personal life on separate computers and you will limit the amount of cookies, spyware and monitoring that can take place, as well as reduce the incidence of identity theft.

Be careful when using public computers

Avoid banking or conducting personal business on public computers at libraries, hotels, and airports. Your online activity could be intercepted or recorded, or someone may be watching your activity and remembering passwords and other personal details.

Stay informed

Subscribe to sites like the National Cyber Alert System at …

US-CertSubscribing to trusted sites that deal with cyber security issues in a timely manner will help you stay informed and proactive when it comes to effectively protecting your home and business computers.

Basic Guide To Computer Security

Download the free Basic Guide To Computer Security below …

Next Step:

Now that you know the basics of keeping your computer device secure, the next step is to learn how to protect your computer from malicious software and software-based security threats.

help To learn more about keeping your computer protected from malicious software, see the tutorial below:

redarrow Computer Software Security

Computer Security Tutorials Review …

Computer Security Tips

(Source: Pixabay)


"Learning WordPress has been a huge stumbling block for me. I've been looking for something that covers absolutely everything but doesn't cost an arm and a leg. Thank you so much ... you have just provided me with what I have been looking for! Truly appreciated!" - Tanya

Disclaimer: WordPress and its related trademarks are registered trademarks of Automattic, Inc. This site is not affiliated with nor sponsored by Automattic, Inc. or the WordPress Open Source project. This site and the products and services offered on this site are not associated, affiliated, endorsed, or sponsored by WordPress, nor have they been reviewed, tested, or certified by WordPress. The owner, contributors and/or advertisers may derive financial benefit from sales of items advertised, reviewed, or linked to this site.


Was this tutorial useful? If so, please consider sharing this post with other bloggers using the social buttons below.

Author: Martin Aranovitch

Martin Aranovitch is the founder of and has authored hundreds of FREE WordPress tutorials for non-techies and beginners. provides detailed step-by-step tutorials that will teach you how to use WordPress with no coding skills required and grow your business online at minimal cost!

Originally published as Computer Security Tips.