1 Secure your email
Outlook and other email clients let you install a personal security certificate, which you can use to encrypt email so that only trusted recipients can read it, or digitally sign your messages to prove that they came from you. You can get your own certificate from comodo.com and it doesnât cost a penny. The catch is that your recipients will need to be using a compatible email system â if theyâre using Gmail on their smartphone, theyâll just be annoyed when you keep sending them unreadable strings of garbled data. âIt also means youâve got to protect your laptop,â points out Tony Anscombe, security âevangelistâ at the antivirus firm AVG. âIf your laptopâs stolen and your password is written on a Post-it note on the screen, then whatâs the use of the encryption?â
2 Get virtual
Running programs in a virtual environment, rather than on your ârealâ desktop, makes it harder for viruses to sink their claws into your computer and if you do get infected, itâs easy to roll back your software to an earlier state. âItâs a complex thing to do,â warns Anscombe. âBut there are benefits. If I wanted to download something that I was suspicious of, I might do that in a virtual machine, then disconnect the VM from the network before opening it.â Virtualisation isnât a panacea, though. Many attacks are aimed at stealing your passwords and banking details; if you get tricked into revealing these, virtualisation wonât make a blind bit of difference.
3 Keep a second, secure PC
Many computer infections are caused by people unwittingly visiting untrustworthy websites or downloading malicious software. Keep your banking and payment details safe by designating a second computer â perhaps an old laptop â as your âsecureâ device and do your gaming, email and web browsing elsewhere. Switch it off when not in use, so even if an opportunist hacker does manage to get on to your network, they wonât be able to access your most important information. If you donât have a spare computer lying around, then you can create a soft âwallâ between your online accounts by installing a second browser on your main PC and using it only for secure transactions.
4 Clean out your system
If you must use Windows then itâs vital to ensure that only trustworthy software is running on it. Unfortunately, this can be tricky, as new laptops almost inevitably come preinstalled with a metric tonne of unwanted applications. These can get in your way, impede performance â and endanger your privacy and security by harvesting personal information. The good news is that Windows 10 includes a new âReset Windowsâ feature that reverts the OS to a freshly installed state, removing all extraneous software in the process. Make this the first thing you do when you buy a new laptop and youâll be rid of all those bundled items for good. Be aware that this will wipe any personal files on the hard disk, along with bonus programs you might want to keep. A more surgical approach is to open up programs and features, scour the list of installed programs and remove any applications you donât want or recognise.
5 Switch to hipster applications
Itâs not just the operating system thatâs vulnerable to attacks. Cyber-criminals can and do find security holes in applications of all sorts, which is why weâre constantly being nagged to install updates and patches. Just as you can avoid most viruses by switching away from Windows, you can reduce your risk by using less popular software thatâs less likely to be targeted: for example, instead of Chrome you could switch to the Opera browser. Instead of Microsoft Office, consider LibreOffice (which has the additional benefit of being free).
Obscurity doesnât necessarily mean security, however, warns Anscombe. âWhen you see an unfamiliar piece of software that you fancy downloading, you might not know if itâs no longer being updated. It may contain vulnerabilities that arenât being patched.â If you choose the road less travelled, make sure your applications are being properly maintained or you could be leaving yourself more exposed than ever.
6 Browse the web incognito
A VPN (virtual private network) service lets you surf the internet from an assumed location. Theyâre popularly used to bypass regional restrictions on streaming video services; using a private channel also conceals exactly what youâre accessing, so your online activity canât be tracked by your ISP, nor by hackers or government spies.
For the ultimate in security, consider using the Tor web browser (torproject.org), a free tool that routes your traffic through a maze of servers all over the world, making it effectively impossible for anyone to monitor or trace your activity. Tor is beloved of whistleblowers, political dissidents and criminals, but it can be frustrating to use: when all your connections are forwarded through China, Brazil and any number of other countries in between, websites tend to load very slowly indeed.
7 Set your router to a stealth mode
If a stranger can get on to your wireless network, thereâs no end to the trouble they can cause. The primary way to stop them is to set a strong password, but you donât need to stop there. Buried in your routerâs configuration page, youâll find the option to hide its SSID â that is, the name of your wireless network â so that only those who know its name can discover and connect to it.
You can also make it harder for interlopers to get on to your network by turning down the transmission strength, so that devices in neighbouring houses or outside on the street canât get a good connection. âThat helps ensure no one else can use your router, but it might mean you canât either,â says Sian John, chief strategist for Europe, the Middle East and Africa at cyber-security firm Symantec. âLowering the power makes life harder for hackers but also for the person in your spare bedroom wanting to watch Netflix at 2am.â
A more hands-on approach is to line party walls with a few layers of aluminium foil, which should drastically cut the signal strength to your neighbours. The security experts suggest that this is only for the truly paranoid, however. âYou can put tin foil around your home if you want,â says John, âbut itâs probably the household equivalent of putting a tin hat around your head.â
8 Donât use Windows
Microsoft has been ramping up Windowsâ security for more than a decade, with technologies such as Windows Defender and User Account Control blocking off old vulnerabilities. All the same, the vast majority of hack attacks and viruses target Windows: switch to a Mac, a Chromebook or even a Linux system and your exposure is instantly slashed. Donât get complacent, though. âWindows has more threats because everyone uses it,â notes John. âAs more people use Linux or Mac OS, the more the bad guys start targeting those platforms. What we see is people switch to, for example, a Mac and they think they donât need any security software. So they get infected and the attacker gets full control of their system.â
9 Check your online footprint
Like it or not, thereâs a huge amount of personal and professional data about all of us washing around on the internet. And itâs a huge security risk: a determined attacker could easily collect enough information to pretend to be you, or a close colleague, and gain access to things they shouldnât.
If youâre worried about your online profile, companies such as London Digital Security Centre (londondsc.co.uk) will â for a fee â sweep the internet to find out exactly whatâs out there and help you get sensitive items removed. âItâs the digital equivalent of a credit check,â says David Emm, principal security researcher at Kaspersky Lab. âIf some stuff has been exposed that perhaps youâd prefer not to get out, perhaps a pictureâs ended up somewhere and you donât know how, then itâs something to think about.â
Prevention is, however, always better than cure. âFocus on what youâre sharing, and check the security settings on your social networks,â Emm advises: both Google and Facebook offer their own free âprivacy check-upâ services to help you avoid oversharing.
John adds a final piece of advice: âGoogle your own name and set up a Google Alert for yourselfâ, so that you receive a notification whenever a new mention of your name appears online. âItâs not vain to have alerts set for your own name and address. Itâs amazing what you can find out.â