Share, , Google Plus, Pinterest,


Posted in:

Time for a Computer Security Audit?

Whether your computing is done for business or for home use, this is not the time to take your computer security for granted. Scammers are busier than ever finding ways to steal your money, information and security. Let’s review the basics of auditing your systems for protection.

Check your anti-virus programs to ensure they are still enabled. In our busy day-to-day lives, an expiration can be easily over-looked. Mark your calendar when it will expire. An easy mistake to make is with automatic renewals and forgetting to update payment information. For example, if a credit card expires, know where it’s being used so it can be updated.

Also review how your anti-virus software is being used. Many provide options for website scans, VPN protection and other functionality that may not have been needed a few years back. As your computing environment changed however additions may be beneficial. Also be sure any new computers added in the business or house are protected as well. You don’t want a virus to creep around a firewall to a vulnerable system and then have it spread itself throughout your intranet.

Ensure you are at the best version levels for your operating systems. Many security issues are fixed by the vendors upfront and rolled out with systems updates. For a number of reasons they might not make it to your systems so be sure to schedule time to get them done if they’ve been avoided. Same goes for applications that run the business or the kids use on a regular basis. Keep an eye out for bulletins and emails that inform what’s coming.

Don’t forget to have some type of backup strategy available and make sure it’s working. It can range from a cloud solution to a local disk farm you keep in-house. Whichever is best for you, it only earns its value when used.

Finally, educate the system users whether they are employees or family. The first line of defense in cyber security is education and making sure they know to not write down passwords and how to create strong ones. Identifying what a secure connection looks like and what potential phishing or other threats are will go a long way to protection from unwanted events.

This is just a start so research what else you may be able to do to keep your computer environment secure.

Ted Saul is a business coach that assists with Business Plans and Project Management. He earned is MBA from Regis University along with a masters in project management. He is also ITIL 4.0 certified. Ted can be reached on LinkedIn or emailing

Written by Ted Saul, Sr. Staff Writer

Ted Saul is a business coach that assists with Business Plans and Project Management. He holds a master certificate in project management and has earned his MBA from Regis University. Ted can be reached on LinkedIn, TedS787 on Twitter or emailing

112 posts