Page 24 - index
P. 24
your system. In other words, if you smartly configurate your e-mail account, you would remain cyber
safe from the threat that intends to do harm within your e-mail correspondence.
Also, many public e-mail services offer an opportunity to set up your security option and, for
instance, choose your own computer or laptop to be the trusted one or you can even select that the
one how steals your mails sees them as unreadable. You would agree it’s quite good and
convenient way to protect your assets.
How to Deny a Remote Access to Your Computer?
As we said, the best way to stay away for the bad guys is to deny their remote access to your
computer. In Figure 1, we illustrate a significance of the smart configuration of your computer as
well as a denied access to malicious actors in sense of the safe cyber system.
Figure 1. How to get cyber safe?
As explained before, the biggest issue with the modern hacking tools is that the bad guys can take
a remote control over your computer and they can see on their screen what you do on yours. When
they see you are struggling, they will get more motivated to attack.
Luckily, many commercial operating systems of nowadays offer an opportunity to set up your
options for a remote access. You do not need to be an expert, it’s enough to be an advanced
system’s user to choose a smart configuration for your computer that could prevent you from cyber
incidents and keep the bad guys away from you private or business information.
Here, we strongly recommend to try to play with your remote access options on your, say,
Windows, Mac or Linux machine and attempt to figure out which configuration is the most suitable
in terms of denying an access to malicious actors.
Also, it may appear as quite convenient if some organizations or businesses would invoke such a
security procedure and use it on regular basis, because it could be a pretty good way for them to
24 Cyber Warnings E-Magazine – February 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide