Home / Security Tales / The computer geek’s guide to security

The computer geek’s guide to security

403462128_a8f85783e9_bLearning how to secure personal data is no easy task, especially for the average person. The average user has limited knowledge of data security and the risks involved in leaving personal data unsecured. Terms like data leaks, phishing and computer hacking have little meaning to them, as they believe they are not a target. Contrary to their belief, no one is immune for cybercrime. Whether you are rich or poor have good credit, bad credit or no credit, everyone is fair game in eyes of cyber-crooks.  Today is no longer the age of petty theft; there are bigger fish to fry in the age of technology. As a result, those who don’t educate themselves on best data security practices are often the first ones to fall prey to these scams. In an independent survey, nine geeks – paranoid about data security – were interviewed. The key to staying secure is not to pull-out-all-the-stops. The following things need to be done to protect your online identity.

Offline data protection:

Most of our sensitive data is not online. That means that your data is saved on your PC somewhere. Therefore, travelling with your laptop can be risky. Since laptops are hot items, the thieves love to steal them. What’s scarier is that nearly all stolen laptops will have their hard-drives scourged. Information such social security numbers and confidential personal information can then be used to conduct crimes such as identity fraud and perhaps even more serious offenses using the identity of their victim. Consequently, geeks have long been protecting their personal data with folder encryption software

Encrypt your online connection:

True computer geek never reveals his online identity, he or she hides their identity just in case they are being spied upon by the government, corporations or other hackers. Be it on social media, causal surfing or using the smart phone, they are always connected with a virtual private network. The VPN is software which encrypts your online identity, making you appear as someone you’re not. Thus, you could be sitting in Kansas, yet anyone spying on you sees that your location is in Alaska.  Perhaps the most and dynamic VPN is the Tor browser. Users can download this browser for free and use it every day, although, using VPN will slow down your internet connection speed, so one has to be prepared to compromise on that front.

 Lockdown all external drives:

If you use external hard-drives and USB flash drives, then you need to add a layer of security on them ASAP. Most external storage devices are used to transport large chunks of data from point A to B.  This means that at some point during your journey, there is a chance you might end up losing or having your device stolen. Geeks know the risks that come when travelling with your external drives; therefore they have taken measures by password-protecting their external drives with external drive encryption software. These security software are often self-executable and don’t depend on an operating system to run.


Sadly most people are well aware of the risks involved when their private data is not secured, yet time and time again they fail to take the rec
ommended measures. Thus, it’s more of an issue of being lazy rather than being misinformed.

About Irfan Ali

Irfan Ali
I am technology enthusiast who loves blogging about smart phones, laptops and everything that goes beep.

Check Also

Dell plans to purchase EMC Corporation for a whopping $50 billion dollars

Dell is an American company that is best known for their laptops and desktops. However, ...

Leave a Reply

%d bloggers like this: