Every day you hear about
scammers, hackers, and thieves, trying to use the
internet to steal your money and your financial
information. The fact is you, me, we, can
foil many of their attempts. Every day, we do things to make
it tough for bad guys to break into our homes
and our cars. We can make it tougher for
them to break into our computers too. Here are some ways to foil
a hacker and protect your financial information. Install security software
on your computer. Well-known companies offer
plenty of free options. Set the software to update
automatically so it can deal with any new security threats. While you’re at it, set your
operating system and web browser to update automatically
too. If you’re not sure how, use the
Help function and search for automatic updates. If you get a phone call, an
email, a text, or a pop-up that says your computer has a
virus or malware, don’t buy the story or the security
software they’re selling. It could be a trick to get you
to buy software that’s worthless or even harmful. Treat your financial information
like cash. It’s a hot commodity. If someone asks for your
financial information, say your social security, credit
card, or bank account number, ask why they need it and how
they’re going to protect it. If you think you’ve found a
good deal online but you aren’t familiar with the
company, dig a little deeper. A quick internet search with
the name of the company and the word review or complaint
can reveal a lot. Always look for a physical
address and phone number too. That way you know who to contact
if there’s a problem. Don’t provide your personal or
financial information unless the website you’re
on is secure. If the URL doesn’t start with
https, don’t enter your financial information. That S stands for secure. It means the information you’re
sending is encrypted and protected. Make your passwords count. They should be at least 10
characters and a mix of numbers, letters, and
special characters. Don’t use your name, birth
date, or common words. Don’t use the same password
for several accounts as tempting as that maybe. If it’s stolen, hackers
can use it to access your other accounts. Keep your passwords in a secure
place, and don’t share them with anyone. Back up your computer files. For example, copy important
files to an external hard drive on a regular basis. That way if there’s a problem
with your computer, you won’t lose everything. Life is online whether you live
it using a smartphone, a tablet, a laptop, or a desktop,
it’s a good time to make computer security
a habit. Find out more at
OnGuardOnline.gov, the federal government’s site to help
you be safe, secure, and responsible online.

Computer Security | Federal Trade Commission
Tagged on:                                 

18 thoughts on “Computer Security | Federal Trade Commission

  • April 10, 2015 at 3:55 pm

    Very helpful…

  • August 31, 2015 at 6:02 pm

    I had to watch this for my homework

  • December 29, 2015 at 11:27 am

    Thank for update my guard protect my access acct.Thanks,Sergio C. Adino

  • January 15, 2016 at 10:29 am


  • April 27, 2016 at 7:46 am

    Thanks for shared this video. It's very useful.

  • July 12, 2016 at 4:50 pm


  • October 25, 2016 at 1:55 pm

    ENO Brasil onde são seus pontos

  • February 20, 2017 at 12:19 pm

    Arab translation please.

  • July 20, 2017 at 10:44 pm

    sorry i mean thanks for the info..

  • July 20, 2017 at 10:46 pm

    thank you, thank you, thank you… a million times thank you,

  • July 31, 2017 at 2:18 am

    Tell trump to drop a nuke on the stupid North Korea country

  • December 15, 2017 at 9:24 am

    Not baD!

  • January 28, 2018 at 12:37 pm

    too much helpful

  • July 25, 2018 at 7:06 am

    It's informative

  • December 22, 2018 at 1:31 am


  • January 17, 2019 at 2:46 am

    Under the Federal Trade Commission Act when consumers have personally identifiable information with the Constitutional right of a fraud investigation by a federally insured racketeering investigator for a prohibited activity can circumstantial evidence provide Ex Post Facto cause with the Inspector General of the FTC and Privacy Officer rights for that investigator? How does the Dept Collection Improvements Act benefit the knowledgeable parties who worked with the U.S. Government in the federal cause and jurisdiction in such case work that insurance investigations by the Office of Personal Management. Cross Ref. Administration Procedures Act sec. 3 (5 U.S. Code 552), sec. 10 arbitrary, capricious, or an abuses of discretion (5 U.S. Code 701-706); 5 U.S. Code 556 Hearings; evidence; burden of proof; powers and duties; presiding employees.

  • September 17, 2019 at 6:11 pm

    boring had to watch for homework

  • September 30, 2019 at 10:56 am

    I Do not need your ASSistance


Leave a Reply

Your email address will not be published. Required fields are marked *