Wales

Protecting Your Computer

Risks

Viruses & Spyware

A virus is a file written with the sole intention of doing harm, or for criminal activity. There are many types of virus. Viruses and spyware are also known as 'malware'...

Avoiding Ratting – Remote Access Trojans

You use your computer or mobile device for many everyday private or confidential tasks, which is why it is essential to take precautions to protect it from viruses and spyware. One type of spyware becoming increasingly common is...

Ransomware

Ransomware is a form of malware that gives criminals the ability to lock a computer from a remote location - then displays a pop-up window informing the owner that it will not be unlocked until a sum of money is paid. In some...

Spam & Scam email

email is both an excellent communication tool and also a way that companies can inform you about their latest products and services. However, email is frequently used to deliver unwanted material which is at best, annoying and at...

Viruses & Spyware

A virus is a file written with the sole intention of doing harm, or for criminal activity. There are many types of virus. Viruses and spyware are also known as 'malware'...

Protection

Changing wireless passwords/SSIDs

Your wireless router needs a password to let you connect your computers, mobile devices and smart devices over Wi-Fi. Routers frequently come with a password that is common to all of the others provided by your ISP. If this is...

Replacing Windows 7

If you still run Microsoft Windows 7 on your computer, you need to be aware that Microsoft ceased support for the operating system on January 14th 2020. As a result, it no longer issues updates, security patches, bug fixes and...

Replacing Windows XP

Despite the frequent introduction by Microsoft of newer versions of its Windows operating system over the years, some business and home PC users are still using Windows XP, which was replaced back in 2007. However, Microsoft...

Update Your Browser

Get Safe Online recommends that for optimum safety and security when using the internet, you always run the latest version of your chosen browser that your operating system will support. You should also always download and...

Safe Linux Use

This page provides advice on some of the most important activities that are particularly relevant for protecting Linux workstations. It includes advice for people running individual Linux workstations (for example, home or small...

Physical Security

Physical security is just as important as online security in protecting your computer and yourself against crime. This page covers physically protecting your equipment and data not only from theft, but also from fire, flood and...

Safe Mac Use

Apple Macs are less vulnerable to attack by malware than PCs. Many people, in fact, believe that Macs are immune to viruses and spyware, but this is definitely not the case. As the use of Macs increases for both personal and...

Safe Computer Disposal

Computers that you no longer need should be disposed of with great care. The data on your computer can easily be accessed whether you sell, scrap, give away or donate it, and even ‘deleted’ data can be retrieved with relative...

Software Updates

The software that may be on your computer includes:...

Wireless Networks & Hotspots

Wireless networks have revolutionised the way we can use computers and mobile devices, both in the home and office – and when we are out and about. Home and office wireless networks make it easier to use the internet and send...

Backups

The information held on your computer may be irreplaceable. Regularly backing up your data will ensure that you have more than one copy....

Windows Updates

When Microsoft launches a new version of Windows, online criminals quickly find vulnerable areas in the operating system and continue to do so for the lifetime of the version. To counter this, Microsoft releases regular updates...

Firewalls

Because the internet is a public network, any connected computer can find and connect to any other connected computer. A firewall is a barrier between the internet and your own computer or network. Think of it as a highly...

In partnership with