Protecting your Home Computer

The best approach in protecting your home computer is to have different layers of security.  This should include anti-virus programs, anti-spyware programs, firewalls, operating system updates, etc.  The more layers of security you have, the more difficult you make it for someone to gain access to your computer and your personal information.

 

It' very important to keep your home computer's anti-virus programs up-to-date.

 

Make sure you have a firewall for your home computer.  A firewall watches for outside attempts to access your computer.  Some operating systems come with a built-in firewall – make sure it is on if you have one.  Several free firewall programs are available on the Internet as well.  Make sure your firewall is enabled before accessing the Internet.

 

Be cautious when downloading and running programs or Java or ActiveX applets as they may contain unsecure data which can’t be filtered by firewalls or anti-virus software.

 

Use spyware detection software tools to identify and delete known malicious programs on your personal computer that may monitor and collect your keystrokes and send personal information to third parties without your knowing it.   Spyware is software installed without your knowledge or consent that adversely affects your ability to use your computer, sometimes by monitoring or controlling how you use it.

 

Download the regular system updates for your operating system and software programs.  The latest security measures are often included in these updates and by taking advantage of these updates, you’re keeping your computer as up-to-date as possible.

 

Regularly access your browser’s website to download security patches.  Installing security patches as they become available will protect you against a variety of software vulnerabilities.  Take the time to understand the security features on your browser.

 

Avoid downloading programs from unknown sources. Some sources may have hidden forms of spyware or viruses that could compromise the security of your computer.

 

You can verify secure sites by "double-clicking" on the padlock icon located at the bottom of your browser application and reading the site information in the box that appears.

 

Don’t open e-mail attachments that have file endings of .exe, .pif, or .vbs. These are file extensions for executables, and are commonly dangerous files.

 

Clear the cache of your browser on a regular basis.  Browsers generally cache (save to your hard drive) images of pages they have downloaded to enhance performance. By clearing your browser cache after visiting secure sites, you ensure no one else can view any confidential information that may have been stored in the cache files on your computer. Please refer to your browser instructions for information on clearing the browser cache area.

 

Regularly log into your online accounts to monitor activity.  In addition, review your bank, credit card and debit card statements when they arrive to make sure all of the transactions are legitimate.

 

Take the time to log off.  Remember to log off when you are finished using your computer or Online Banking. Please use the Online Banking "log off" feature if, during the use of Online Banking, you are going to be away from your computer for any length of time. The "log off" feature will end your Online Banking session and you will be required to submit your User ID and Password before entering Online Banking again.

 

Make sure to completely shut down your browser.  Shutting down your browser is also a good way of preventing others from gaining unauthorized access to your account. For your protection, Online Banking contains an automatic five minute time out feature. Should you walk away from your computer during an Online Banking session and not exit from Online Banking, the session will automatically end in five minutes. You may reset this feature to time out at different intervals up to twenty minutes, depending on your preference.

 

Never use a public computer such as those found in libraries, airports or hotels to perform confidential tasks such as online banking or checking e-mail.  Use of these computers is typically unmonitored and they may be infected with keystroke loggers or viruses that can capture your login information and send it to criminals.

 

Never e-mail personal information or account numbers. Regular e-mail isn’t secure.  Some companies have special secure, encrypted e-mail systems they use to communicate with their customers but most do not.  Third Federal has a secure e-mail system available after you login to Online Banking. 

 

Use the notifications features in Online Banking to alert you of certain activities.