iTecs IT Outsourcing and Support Blog
Most of us have been tempted to venture in some corner of the Internet that could be considered high-risk for one reason or another. Maybe you were looking for lyrics for a song or subtitles for a movie you downloaded. Either way, when you venture outside the bubble of popular websites, you put your computer and your data at risk.
Protection for your computer is like an onion, with various layers of protecting solutions safeguarding your system.
While this layer of protection is standard, it's never the end all be all. A lot of viruses can bypass even the best-rated AV scanners on the market today. If your computer was the core of the onion, this is the very thin layer covering it, and as the skin on your body, it can be very porous.
There are numerous others however for this article I'll cover the basic and most accessible to the average user. You can install a firewall/router that has built-in security services like the Dell SonicWall. A firewall/router that scans inbound and outbound network traffic for malicious code is a decent layer of protection since it can stop a virus from ever reaching your computer. But even this solution can't be 100% effective all the time, and these units can be costly and slow your Internet browsing speeds.
Another layer you could add to help safeguard your computer is to use a second browser that is configured only to read the underlying HTML code of a website and never executes JAVA, Flash or accepts cookies. For example, if you use Chrome as your primary browser, you could setup Internet Explorer to be as restrictive as possible by disabling JAVA, Flash, accepting cookies and even processing images the website presents. If you are unsure that a site you want to visit is 100% safe, use your locked-down Internet Explorer to view it.
Yes, there is, and it's free! It's called Oracle Virtual Box (https://www.virtualbox.org/) and like VMWare Workstation, you can launch a virtual machine from your desktop computer and use it to visit possibly unsafe websites. If your virtual machine becomes infected, delete it and run a new VM.
You can go a step further and make sure that your local host and other networked computers have rules in their firewalls blocking the network traffic generated by your virtual machine.
The thought of doing business solely on a cloud environment can sound overwhelming. From figuring out what it entails and what type of service or hardware will be needed to how to maintain and sustain that type of environment, the task seems daunting. Naturally, the first place to start is with a web search. How do I run my business virtually?Read More
The new way of doing business is electronically. The way we communicate and transact is mostly through a device, and even more so now in the days of Zoom meetings and virtual tours. Most employees cannot be efficient without a computer and a mobile device, and it is the responsibility of the company to ensure that they have all the proper tools to perform their jobs efficiently.Read More
Two of the most common reasons for opting out of owning hardware are maintenance and life span. Technology is constantly evolving and servers can quickly need hardware updates or become obsolete. It is crucial to compare the cost of owning the equipment, maintenance, and upgrades versus the cost of operating in a virtually hosted environment.Read More