Call Us!
Contact us
Visit or Call our office Mon-Fri, 8am-5pm.
1-270-442-9726 Phone
1-270-442-5058 Fax

Or Email Us using the form below.
* required fields





Computer Source, Inc.
2623 Wayne Sullivan Drive
Paducah, KY 42003
Map it

Thank you for your interest!

Thanks you for contacting us. We will get in touch with you soon!

Close this window

Computer Source - Helping Block Threats of Intrusion and Theft

Secure Solutions

Your computer is only as secure as your security system. When leaving your computer unattended at work or out in public, it is important to have measures put in place to keep other people from viewing, altering, or hijacking your system or any information you have stored there. Computer Source can put the necessary software at your fingertips to help prevent unwanted access to your computer and put software in place to block those trying to steal your computer and information.

Preventing Intrusion

The first step to prevent unwanted access to your computer is to never leave it unattended around people you may not trust. This is especially important for laptops, notebooks, tablets, and slate computers. For more active solutions for preventing intrusion into your computer, here are some other steps:

Software

The best way to catch and stop intrusion through the internet to your computer or hacking, is to have software installed that blocks and notifies you of such activity. There is a wide variety of good software and a lot of bad, so let Computer Source help you find software that fits your needs.

Hardware

Firewalls and Secure Gates are heavy-duty ways of preventing users access to you from outside the internet or within your own network. Computer Source can provide you the correct appliances with software aimed at locking out intruders.

Secure Passwords

Without locking your computer with a good password, your computer is easily available to anyone else who wants to browse it's contents. Passwords set up to be entered on boot, after sleep, or to stop a screen saver, are standard operating procedure when preventing unwanted access to your valuable data. All modern operating systems have these capabilities, and most even provide system level password protection so your computer can not be booted from a CD or another disk as well. However, more often than not, passwords are usually not as strong as they should be and are often a word, phrase, or something else familiar to or able to be figured out by other people. In today's technology world, there is no way to avoid passwords. Although keeping up with passwords can be tedious, they are your first line of defense against protecting your computer from access other than you.

There are a few rules for creating passwords.

  • NEVER use names, dates, addresses, or phone numbers as your password
  • NEVER use the same password for everything.
  • ALWAYS write down your password(s) in two places. One place you can have relatively easy access because you will need that list possibly on a day to day basis unless you have a remarkable memory, and another place you can be sure to find them in case the other is lost.
  • ALWAYS create passwords that are over eight characters and not easily conceived.
  • ALWAYS change passwords often.

Click here for Microsoft's guidelines for creating differing levels of secure passwords:

Preventing Theft

Although there is nothing that you can do to stop someone determined to unlawfully take your computer away from you, there are some tips you can follow.

  • Never leave your computer unattended.
  • Keep your computer backed up so you won't lose data if theft does occur .
  • Keep your computer password protected so your data is more likely kept safe. Additionally, there is also optional software or some operating system settings that allow you to encrypt your data with a secure password, which makes it practically impossible for a thief to access any data on your computer.
  • Securely lock down you computer when possible with desktop and laptop locking devices. Most computers have areas on them where these locks can be attached. Although they do not prevent theft all the time, they are a great deterrent, especially with desktop computers in high traffic areas, like offices or schools.
  • For laptops, notebooks, and mobile devices, tracking software can be installed when possible. Although there is no guarantee, this software could possibly allow your computer to be tracked if it is turned on and connected to the internet before being dismantled, or can at least keep a thief from accessing anything on the device.

NOTE: Our advice is to never engage someone who has taken your computer. Always contact the authorities when theft occurs. If you have tracking software installed, make sure the authorities are aware and then they can ask your assistance with determining if the software would provide any information valuable to finding your stolen equipment.

Contact us if you would like assistance or have any addition questions regarding these topics.




















Computer Source, Inc. Footer Menu
Home     Services     Products     Corporate     Microsoft     Apple     Equus     DocuWare     Data Protection     About Us     Contact Us     Site Map
Copyright © 2017 Computer Source, Inc. All Rights Reserved. Powered By Computer Source, Inc.