Previous Page  4 / 16 Next Page
Information
Show Menu
Previous Page 4 / 16 Next Page
Page Background

This information booklet aims to provide practical tips and advice on how individuals can

protect their personal data when using information and communication technologies.

1.

Trojans are software that are advertised to do one thing, but secretly also do other tasks, such as acting as a keylogger, file-sharer and / or

zombie.

2.

Keyloggers are software that capture your keystrokes, including website addresses, usernames and passwords, and send them to a hacker

without your knowledge.

3.

Zombies are software that take over control of your computer so that it can be used remotely by hackers to send spam, attack websites, etc.

without your knowledge.

Install proper anti-virus software

Malware is a collective term for viruses, worms, trojans

1

, keyloggers

2

, zombies

3

, etc. that can harm

your computer and / or steal your data. Install the most up-to-date anti-virus packages, either paid

or free, and make sure the signature files are regularly updated according to the software vendor’s

recommendation.

Anti-virus packages are also available for smartphones and tablet computers. As these devices

have become popular devices for connecting to the Internet and can hold as much personal data

as a computer, protecting them with anti-virus software is crucial.

If available, you should switch on the personal firewall feature of your operating system or anti-

virus package. A personal firewall controls network traffic to and from your device and reduces

the risk of your devices being hacked or attacked.

Securing devices such as computers, smartphones and tablet computers

that you use to connect to the Internet is the first line of defence. The

following technical steps will reduce the risk of harm to your devices by

malicious software.

Secure

Your Information and Communication Technology Devices

Protecting Privacy - Using Computers and the Internet Wisely

Protecting Privacy –

Using Computers and the Internet Wisely

3