How To Use Firewall And Anti-Virus For Device Protection

How To Use Firewall And Anti-Virus For Device Protection

A firewall is a part of the computer system or network that is designed to block unauthorised access from devices. In this article, I want to talk about some of the ways to use firewalls and virus for device protection. Follow me as we are going to look at that together in this article. 

 

It controls traffic coming into and leaving the system by permitting authorised communication. The firewall can hide the user’s home network from the outside world. Also, It can also be either software or hardware.
 

 

It is also recommended that we implement firewall technology on every device. It will help to prevent unauthorised access to devices. 

 

The firewall also monitors all the requests coming into the system, alert the user, and asks permission for allowing and blocking them from accessing devices. 

 

Examples of software firewalls include: 

  • WIndows FIrewall ( check Securing Operating System module)
  • Norton Personal FIrewall
  • Sunbelt Personal FIrewall
  • ZoneAlarm 
  • Comodo Personal Firewall

Use Anti-Virus Protection

Anti-Virus software is used to prevent, detect, and remove malware, including computer viruses , worms, and trojan horses. 
They offer “real-time” protection for email and files as they are received.  They are to be configured to scan: 

  • All the workstations 
  • complete network regularly
  • All incoming and outgoing traffic
  • Email attachments 
  • Downloads 
  • Browsing

 

Use Strong Passwords 

Password must be something that a user can remember but is not related to the user (Such as date of birth, maiden name, spouse name among others). 
A strong password is 8-10 digital long with letters, numbers, and characters (a special character can be used, but the password should be easy to remember). Always use a strong password when you are accessing resources. 

PEOPLE ALSO READ:  Understanding Attack Surface In Computer Security

Make Regular Backups

Back up the data regularly, it helps to resolve data during security issues. Backup settings and configurations of the router and firewall. 
You need to create a boot disk before a security event occurs; it helps in recovering the system when it is damaged and compromised. 

 Know about Encryption

Encryption is the conversion of data into an unreadable form called cipher text , unencrypted data is called Plain Text. This protects the sensitive information that is transmitted online. 
It is also an effective way to achieve data security. Also, a web browser will encrypt text automatically when connected to a secure server. 

 

 

Action Point
PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on individual and corporate level, I will be very glad to do that I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained includes staffs of Dangote Refinery, FCMB, Zenith Bank, New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training. 

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.

 

Fact Check Policy

CRMNIGERIA is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.

PEOPLE ALSO READ:  Comprehensive Guide On Use Of SD-WAN

 

     

Fact Check Policy

Loading

Related Posts

website usabilitywebsite usability
Website Usability: How To Increase Users Mobile...
Website Usability: How To Increase Users Mobile Experience      In my previous...
Read more
ACT Science Test StrategiesACT Science Test Strategies
ACT Science Test Strategies: How To Ace...
Taking the ACT provides an opportunity for all students to...
Read more
Day 79 2023 MFM 70 Days Fasting And PrayersDay 79 2023 MFM 70 Days Fasting And Prayers
Day 69 2022 MFM 70 Days Fasting...
MFM 70 Days Devotional Songs [Pages 4-10] Praise and Worship Prayers of...
Read more
Tips On How To Become An SEO ConsultantTips On How To Become An SEO Consultant
Tips On How To Become An SEO...
  Becoming an SEO consultant is not as tough as it...
Read more
Health Benefits Of Cordy Active CapsuleHealth Benefits Of Cordy Active Capsule
Health Benefits Of Cordy Active Capsule
Health Benefits Of Cordy Active Capsule In my previous article, I...
Read more
video conferences infographicvideo conferences infographic
Video Conferences Infographic: How To Make It...
  The modern workplace is increasingly relying on video conferences for...
Read more
4 Impacts Of Internet On Businesses4 Impacts Of Internet On Businesses
4 Impacts Of Internet On Businesses (+Practical...
    If there is one thing that has revolutionised how business...
Read more
Relationship Between Affiliate Marketing And Influencer MarketingRelationship Between Affiliate Marketing And Influencer Marketing
Video: 13 Specific Factors That Can Lead...
    This very video discusses specific factors that can lead to...
Read more
CRMNuggets Whatsapp Channel
truehost

Adeniyi Salau is a highly dedicated and committed Blogger of repute. He likes sharing his IT knowledge with others. My desire is to impact as many lives as possible with my IT skills. You can download my mobile APP. Download the ICTLOAD APP on Google Playstore. Thanks.

Leave a Reply

Your email address will not be published. Required fields are marked *

Enable Notifications OK No thanks