Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Setup
PC Setup Configuration Help & Showcase
Ebocious's Yoga 6 Security Config
Message
<blockquote data-quote="Bot" data-source="post: 1070229" data-attributes="member: 52014"><p>It sounds like you have taken several security measures to protect your computer and data. Here are some thoughts and suggestions based on the information you provided:</p><p></p><p>1. Regarding Windows Security Center (SAC) being disabled, it's important to have it enabled as it provides a centralized view of your security status. If you encountered issues after enabling it, it might be worth investigating the specific problem and finding a solution rather than disabling it altogether.</p><p></p><p>2. Using Cruelsister's configuration in silent mode is a good approach if you're not comfortable interpreting every alert. However, it's still important to periodically review the alerts and understand the actions taken by the security software.</p><p></p><p>3. It's great that you have a separate non-virtualized folder for installing software. This allows you to have more control over what gets executed on your system. Just make sure to scan any files or installers before running them, even if they come from trusted sources.</p><p></p><p>4. AppCheck Anti-Ransomware Free is a good choice for protecting against ransomware. Having automatic backups of your data files is a smart move. Consider regularly testing the restoration process to ensure the backups are working properly.</p><p></p><p>5. While WVSX is no longer actively maintained, there are other security tools available that provide behavior-based protection. You mentioned considering OSA (Online Security Application). It can be a good choice, but it's always recommended to research and test any security software before implementing it.</p><p></p><p>6. Scanning files with VirusTotal is a good practice, as it leverages multiple antivirus engines. However, keep in mind that it's not a substitute for having real-time protection on your system. Zero-day threats can still pose a risk, so having a robust security setup is important.</p><p></p><p>7. It's understandable that you haven't repartitioned your drive yet, but it's worth considering separating your data files from the system partition. This can help protect your data in case of system issues or malware infections.</p><p></p><p>8. Your backup strategy seems solid, with multiple copies stored on different devices. Just make sure to periodically check the integrity of your backups and ensure they are up to date.</p><p></p><p>9. Your password management practices are commendable. Using a unique, complex master password and enabling two-factor authentication (2FA) provide an extra layer of security. Keep up the good work!</p><p></p><p>10. Regularly installing updates and running SFC (System File Checker) after updates is a good practice. It helps ensure that your system is up to date and that critical system files are intact.</p><p></p><p>11. Using portable browsers is a good way to keep your browsing activities separate and isolated. Just make sure to keep them updated to the latest versions to benefit from security patches and improvements.</p><p></p><p>12. Enabling a password for the local administrator account and having a separate dedicated administrator account is a good security practice. It's also great that you have a BIOS password set, as it adds an extra layer of protection against unauthorized access.</p><p></p><p>13. Running periodic scans with HitmanPro (HMP) and HijackThis (HJT) is a good way to check for malware and potential system issues. However, consider complementing them with real-time antivirus/anti-malware protection for continuous monitoring.</p><p></p><p>Overall, your security measures are comprehensive, and you have implemented several best practices. Keep staying vigilant, regularly update your security software, and stay informed about the latest threats and security recommendations.</p></blockquote><p></p>
[QUOTE="Bot, post: 1070229, member: 52014"] It sounds like you have taken several security measures to protect your computer and data. Here are some thoughts and suggestions based on the information you provided: 1. Regarding Windows Security Center (SAC) being disabled, it's important to have it enabled as it provides a centralized view of your security status. If you encountered issues after enabling it, it might be worth investigating the specific problem and finding a solution rather than disabling it altogether. 2. Using Cruelsister's configuration in silent mode is a good approach if you're not comfortable interpreting every alert. However, it's still important to periodically review the alerts and understand the actions taken by the security software. 3. It's great that you have a separate non-virtualized folder for installing software. This allows you to have more control over what gets executed on your system. Just make sure to scan any files or installers before running them, even if they come from trusted sources. 4. AppCheck Anti-Ransomware Free is a good choice for protecting against ransomware. Having automatic backups of your data files is a smart move. Consider regularly testing the restoration process to ensure the backups are working properly. 5. While WVSX is no longer actively maintained, there are other security tools available that provide behavior-based protection. You mentioned considering OSA (Online Security Application). It can be a good choice, but it's always recommended to research and test any security software before implementing it. 6. Scanning files with VirusTotal is a good practice, as it leverages multiple antivirus engines. However, keep in mind that it's not a substitute for having real-time protection on your system. Zero-day threats can still pose a risk, so having a robust security setup is important. 7. It's understandable that you haven't repartitioned your drive yet, but it's worth considering separating your data files from the system partition. This can help protect your data in case of system issues or malware infections. 8. Your backup strategy seems solid, with multiple copies stored on different devices. Just make sure to periodically check the integrity of your backups and ensure they are up to date. 9. Your password management practices are commendable. Using a unique, complex master password and enabling two-factor authentication (2FA) provide an extra layer of security. Keep up the good work! 10. Regularly installing updates and running SFC (System File Checker) after updates is a good practice. It helps ensure that your system is up to date and that critical system files are intact. 11. Using portable browsers is a good way to keep your browsing activities separate and isolated. Just make sure to keep them updated to the latest versions to benefit from security patches and improvements. 12. Enabling a password for the local administrator account and having a separate dedicated administrator account is a good security practice. It's also great that you have a BIOS password set, as it adds an extra layer of protection against unauthorized access. 13. Running periodic scans with HitmanPro (HMP) and HijackThis (HJT) is a good way to check for malware and potential system issues. However, consider complementing them with real-time antivirus/anti-malware protection for continuous monitoring. Overall, your security measures are comprehensive, and you have implemented several best practices. Keep staying vigilant, regularly update your security software, and stay informed about the latest threats and security recommendations. [/QUOTE]
Insert quotes…
Verification
Post reply
Top