Tips for protecting your business computer

Before we start listing all the measures needed to protect your computer in order to perform secure transactions in digital banking, we consider it necessary to explain why we called this document “Business Computer Protection Tips”. Your private computers as well as smartphones when using digital banking services are not just your private computers (and a smartphone is nothing but a small computer with the ability to make phone calls) on which you have only your dear data (pictures, contacts, in a word, memories ) already represents a means of work, ie a business computer, because through it you perform financial transactions, ie you perform certain business activities.

In order to safely use digital banking services on your computers, it is necessary to implement the following protection measures:

– Regular updating of operating systems and applications.

Make sure you receive automatic updates and be sure to install any updates that your system requires. Regularly updating Windows, Android OS, iOS, and related applications such as Microsoft Office, Web browsers, Adobe Acrobat Reader, and other software protects your computer and data.

– Be careful when installing:

Avoid installing software and install only software that is secure. which provides regular updates in terms of security patches but also additional functionalities that will prevent potential abuse. Software may only be installed from / from approved sources. Unauthorized programs can create security vulnerabilities.

– If you use Windows operating systems

use Windows Hello to verify your identity: In Windows 10, you can log on more securely using Windows Hello face recognition, fingerprint, or PIN. (In the next post, we’ll cover Windows Hello and how to set it up.) If you use the Android or iOS platform, preferably use biometrics or PIN code to access the phones

– Do not install applications that have been abused in any way before the installation (cracked applications). The crack programs themselves, that is, programs that have changed the source code, in addition to representing copyright infringement, also pose a great risk to the system itself, because they mostly contain malicious code that can collect certain data in the background and abuse it. send unauthorized to third parties such as codes, credit card numbers with access codes, etc.

– Retention of strong passwords: If you must use a password, use a strong one. A strong password contains at least 13 characters and a combination of uppercase and lowercase letters, numbers, and symbols. Change passwords regularly and do not use old passwords or passwords that you currently use elsewhere. (In one of the next posts we will cover the topic of using strong passwords).


– Click carefully: Beware of suspicious connections. They can appear in emails, tweets, online advertisements, messages or attachments, and can sometimes be disguised as familiar and reliable sources. We will write about the threats coming from the “outside” world in one of the following posts.

– Beware of public Wi-Fi networks:

If you connect to an unsecured Wi-Fi network via a business computer, you put yourself and your company at risk. their data to unauthorized persons. Secure networks are those networks that require you to use access codes or certificates for authentication in order to access.

– Store data securely:

Having data is not the only thing you need. It is necessary to keep the same data safely, ie to keep their backup copies in a safe place protected from misuse. When we use the term “data”, it does not only mean something like an email, a saved document, but also access codes, PIN code cards, CVV cards, etc. If a malicious user comes into possession of the stated data, he can use it for the purpose of false representation, which as a result can have a financial loss, and not just a reputation. More about backup data in one of the next posts.

– Browse the web safely:

Avoid visiting sites that offer potentially illegal content. Many of these sites instantly install malware on your device or offer downloads that contain malware. Use a modern browser that has the ability to block malicious websites and prevent malicious code from running on your computer.

– Beware of scams:

Some scammers search for employment information on social media and send emails that are worded as having a connection to the job. Be careful when replying to unsolicited communication via email, phone or SMS. Social engineering is a separate category of fraud, so we will discuss this topic in detail later in further publications.

– Avoid sharing information related to work or personal or financial data on social networks:

Sharing too much information about private or business activities and information can attract fraudsters. They can take advantage of this information and send you targeted fraudulent messages that seem credible.

– Protect physical devices:

Portable drives and mobile devices, such as laptops and mobile phones, can be easily stolen with all the data they contain. Protect these devices and store them in a safe place, especially when using them in cafes or when leaving them in the car. there was an abuse of the same.

– Use updated versions of antivirus software:

Without antivirus software as well as antivirus software that has the latest definitions to prevent malicious code from running on your computers, there will certainly be attempts to misuse your computer, which can lead to both reputational and financial losses.