• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

How to Protect Your Privacy & Identity on Facebook – Part 2

April 18, 2018 by Andy Thompson

In our Part 1 article we covered news related to the Facebook privacy scandal. In Part 2, we will emphasize what you can do.  We’ll provided three best-practice recommendation for protecting your identity and privacy.

Our Private Data

As Facebook users we accept the privacy policies when we sign on.  For the most part we don’t even read over the extensive policy pages.  Instead we set up our account and enter data related to our personal lives.  We understand in the process this information gets recorded and stored.

Take Action:

We recommend that you get a clear idea of how much and what kind of data Facebook collects on you.  Check out the “Data In” section of our previous article for directions on accessing the data Facebook has collected from you.

Facebook is a free service and we can expect that they make revenue by providing our data to advertisers.  What many of us are not aware of is that they pass on our data to third party developers and organizations.

This is why we can sign on to a new app or online service using our Facebook login.  Right away they can access our data so that it is easier for us to create a new account with the third party app rather than having to enter all the personal information they require once again.

But what kinds of control are in place once our data leaves the hands of Facebook?  What kind of regulations are there to protect our privacy and information?  This is what Facebook’s Mark Zuckerberg has to address.

Facebook Updates

In the past Facebook has revised its privacy policies.  However, these previous revisions have been toward openness and sharing rather than protection of privacy.  Unfortunately, “…they were optimizing for profitability rather than security and privacy of their members” says David Kirkpatrick author of the Facebook Effect.[1]

Zuckerberg’s promise at the beginning of this year was to fix Facebook in 2018 – this is no small task.  In fact, he has stated that fixing the company’s problems will take years.

Presently, users are informing users in their News Feed if they’re among the millions of people whose data was improperly harvested by Cambridge Analytica.

Other changes we can expect in the near future: [2]

  • Users will receive notice of all apps they use and what data is shared with those apps.  They then have a chance to delete apps they no longer want.
  • Facebook will restrict access to certain data that applications can acquire.
  • The option to search for users by entering a phone number or an email address will be removed.
  • Facebook will set out to delete all logs after a year and only time of calls will be collected.
  • New policy will also make users aware that WhatsApp and Instagram are part of Facebook and that the companies share information about users.  WhatsApp will still have a separate policy while Facebook and Instagram continue to share one.

Free

Whenever something is offered for free we need to ask: how is this business generating revenue?  Some companies offer a trial license for their software as a means to test drive the service.  Others rely on donation.

In the case of Facebook, it is free to users but there are associated costs.  Not only does Facebook sell data to advertisers who then place ads that are targeted to meet our purchasing preferences, they also harvests our data for app developers as well.

Surveillance Capitalism:

One term being used in many news sources related to this Facebook scandal is “surveillance capitalism”.  Shoshana Zuboff, Harvard Business School professor states that it drives much of the internet.

It’s behind most of the “free” services, and many of the paid ones as well.  It utilizes psychological manipulation in the form of personalized advertising to persuade you to buy something or do something, like vote for a candidate.

“…while Facebook is one of the biggest players in this space, there are thousands of other companies that spy on and manipulate us for profit.” [3]

We need lawmakers to force these companies into the public spotlight and to enforce lawful conduct.

Regulation

Although Facebook is in the process of change and updates we need to ask: how is it possible to keep private data secure after it’s sold to third parties?  Facebook has admitted that it is impossible to monitor what these third parties do with the data once it is out of their hands.  However, Mark Zuckerberg has said that his industry should be regulated.

At present he is facing Congress and has delivered an apology and is answering questions.  But what will be the outcome of this?  What about past regulation?  Zuckerberg has stated they regularly testify before Congress on a number of topics.

In 2011, Facebook offered privacy assurances in a settlement with the FTC (Federal Trade Commission).  Allowing Cambridge Analytica to harvest data could be a violation of that settlement.  The ability to transfer the data of users’ friends should have been banned with the 2011 consent.  But what is the FTC going to do to enforce existing regulations?

Turning Up The Heat:

In 2016, the European Union passed the comprehensive General Data Protection Regulation, or GDPR.  One mandate restricts collection of personal data of EU citizens to be only saved for “specific, explicit, and legitimate purposes” and only with user consent.

This means, consent cannot be buried in the terms and conditions.

This law will take effect in May and companies worldwide are paying attention.  It is expected that this will expose the industry like nothing else.  In preparation for this law, PayPal published a list of companies it might share your personal data with – over 600 companies.

 Best Practices – Privacy at Stake

There is no doubt that privacy of information is at stake.

It’s essential that we throttle back on what information we make available online and what data is stored on our PC.  Here are our recommendations.

    1. We recommend the privacy functionality associated with PC Cleaner. By using the available functionality you can see all the personal and private data you have on your PC which could be accessed by illegitimate means.
    1. When on a public Wi-Fi network, we highly recommend not sharing out any sensitive data. Even downloading records online from a public location or terminal can leave your data vulnerable to hacks.
  1. If you decide to delete your Facebook account, consider the following:
    • You will need to sever all ties with Facebook including Messenger, WhatsApp, and Instagram. Your data can be shared with these apps and policies are similar or, as with Facebook and Instagram, shared.
    • Any apps that you “log in using Facebook“ will no longer work and you will have to enter your log in credentials for these.
    • Delete all Facebook instances from all devices including your mobile ones. Make sure you delete and not deactivate.  Use this link from Facebook.
    • Do not even attempt to log in to Facebook for at least two weeks or you will cancel the account deletion process.

Last Comment

We started out this two part series asking a question of what to do as a Facebook user.  Undoubtedly, the data breach has been the final straw for some and these users are choosing to delete.

Do we throw the baby out with the bath water?

We need to acknowledge that there are positive online developments, and we need to take an active role in shaping it.

With respect to the baby / bath water analogy – we certainly can agree the bath water is dirty!

As for the baby – in the case of social media technology – we need to closely examine if it’s being overfed.

“…the thing we need to understand now,” Shoshana Zuboff states, “is that the online world, which used to be our world, is now where capitalism is developing in new ways.”

[1] http://money.cnn.com/2018/04/09/technology/

[2] https://www.ctvnews.ca/sci-tech/

[3] https://www.schneier.com/

Filed Under: Blog, online security, Online Share, Windows tips Tagged With: Facebook, online identity, online security, privacy, security breach

Facing the Truth – Facebook & Privacy

April 7, 2018 by Andy Thompson

Feeling connected is fundamental to the human experience – feeling part of the whole.  What better way to do that then from the privacy of our home?  We pick and choose when and where and for how long we want to connect when using online social media.

In a previous article we examined Facebook and pointed out its allure.  We listed the aspects of this “free” service and we identified “Likes” and “Dislikes”.  Were we too quick to accept at face value, the company’s emphasis on the importance of privacy?

A Bit about Facebook

  • Facebook, launched in 2004, is the most popular online social media and social networking service. It is based in the U.S. and is the creation of Mark Zuckerberg and his fellow Harvard friends and roommates.
  • As of June 2017, Facebook reached 2 billion active users.
  • It is a giant in terms of net worth. According to Wikipedia, as of Mar 25, 2018, it is worth US$62.2 billion.
  • Recently the company has faced considerable scrutiny and public pressure in relation to hate speech, fake news, depictions of violence, and privacy.

Recent News

Facebook has been in the news multiple times of late.  With news related to privacy of data, we need to start with Aleksandr Kogan, a University of Cambridge professor, who created a survey filled out by 270,000 people.  In doing so, he was able to access the data of what was reported as more than 50 million Facebook users – recent news has been released whereby Facebook has admitted that upwards of 87 million people were affected by this breach.[1]

While Kogan gained access to this information using legitimate means, via proper channels governing all developers on Facebook, he violated rules related to passing the data to third parties which included Cambridge Analytica.

Zuckerberg was aware of this in 2015.  The action taken at that time was to ban Kogan’s app and demand legal certification from Kogan and others he shared it with.  According to Zuckerberg[2], Cambridge Analtyica completed certification and told Facebook that they actually hadn’t received raw Facebook data at all.  Furthermore, Cambridge Analytica deleted it and weren’t using it.

This reliance on certification turned out to be, as Zuckerberg admits, one of the biggest mistakes made.

Cambridge Analytica:  Is a British political consulting firm established in 2013, that combines data mining, data brokerage, and data analysis along with strategic communication.  They are in part owned by Robert Mercer and Alexander Nix has been the CEO however, this position was suspended after a Channel 4 news segment was broadcasted.  In this he was videotaped in an undercover, hidden camera video interview during which he spoke to someone he believed would use the firm in Sri Lanka for election persuasion purposes.  Nix speaks of creating sex scandals and using fake news to manipulate voters.

Cambridge Analytica has been involved in elections worldwide.  Their executives claim the company has worked in more than 200 elections around the world, including Nigeria, Kenya, the Czech Republic, India, and Argentina.

In 2016 they became involved in the 2016 Brexit referendum by supporting persuadable voters to vote for leaving the EU.  On 18 May 2017, the US Congress began investigation with their connection to Russian attempts to interfere with the 2016 U.S. presidential election.  Cambridge Analytica worked for Donald Trump’s political campaign but there is some question as to the level of involvement.[3]

Nix has made bold claims and it is uncertain if some statements have been embellished.  He was quoted as saying this in October, 2016:

Today in the United States we have somewhere close to four or five thousand data points on every individual … So we model the personality of every adult across the United States, some 230 million people. [4]

The Data

News reports point to unethical organizations making use of personal data made available by Facebook.  This begs the question: what data do they have on us and how can they use it?

Data In:

As soon as a user signs up, data and information is collected.  This includes all data – conversations, pictures, videos, and even documents sent via Messenger.  Does this surprise you?  Would you want to see what the information on you includes?

Should we be concerned?  If you use Facebook on your phone and your phone is an Android device, or you use Messenger to send attachments… it would be a good idea to take a closer look.

Users are discovering that they can request to have all of their Facebook data in a zip file.  Some are astonished to find that this data can include data on every call made and text sent.  There are users that are discovering that the data held by Facebook includes rental property lease forms, tenant ledger reports, bill statements, and screen shots of bank transfers.[5]


To download your information:

  1. Click the down-pointing triangle at the top right of any Facebook page and select Settings
  2. Click Download a copy of your Facebook data at the bottom of General Account Settings
  3. Click Start My Archive

In about 10 minutes Facebook processes the request and you’ll get an email and notification when the file is ready to download.

Data Out:

Likely no one is surprised to know that our personal data is being used and shared out to advertisers.  Facebook makes money on sharing out data to advertisers and to app developers.  The challenge is that there is no control of how the data is used once passed to these groups.

Indeed the most alarming aspect of Cambridge Analytica’s “breach” is that it wasn’t a breach at all. It happened almost entirely above board and in line with Facebook policy.[6]

World Response

Investigations are ramping up world-wide.

US:   Zuckerberg will testify before Congress.  On April 10, before a joint hearing of the Senate Commerce and Judiciary Committees and the next day before the House Energy and Commerce Committee.  The U.S. Federal Trade Commission are conducting separate investigations. [7]

This is a serious matter as stated by Senator Amy Klobuchar who serves on the Senate Judiciary Committee.  The senator will ask him to explain “what Facebook knew about misusing data from 50 million Americans in order to target political advertising and manipulate voters.” [8]

UK:   Damian Collins, chair for the Digital, Culture, Media and Sport Committee in the House of Commons, questions Facebook user data policies.  “Their answers have consistently understated this risk, and have also been misleading to the Committee,” Collins said. “I will be writing to Mark Zuckerberg asking that either he, or another senior executive from the company, appear to give evidence in front of the Committee as part our inquiry.” [9]

MPs on the digital, culture, media and sport committee have accused Facebook of misleading it in a previous evidence session and called for Mark Zuckerberg to appear before them to answer questions.  They have also recalled Nix. [10]

A U.K. parliamentary media committee summoned CEO Mark Zuckerberg to testify about how Facebook uses data.  U.K. Information Commissioner Elizabeth Denham is investigating how Cambridge Analytica got the data. [11]

Germany: After a meeting with its executives about the abuse of users’ data, the justice minister of Germany stated she wants closer oversight.

Australia: The Information and Privacy Commission has demanded that Facebook provide information on whether any Australian citizens were affected by unauthorized use of profile data. [12]

The Response:  Zuckerberg is set to testify next week before a U.S. congressional committee, and he said top executives at the company would be dispatched to other countries wanting to hold government hearings on the scandal. [13]

User Response

Zuckerberg has stated that the users affected by the misuse of personal data by Cambridge Analytica will be notified.  To date, this has not yet happened.  There are users that are going to delete Facebook as a result of this news and one of the questions we have posed has been: What is the best course of action with regard to Facebook and social media services?

We invite you to give this some thought and to check in with us next week for our Part 2 edition as we outline what Facebook is doing to correct this wrong and we identify the costs associated with what we thought was a “free” service.

We’ll provide out best practices and recommendations for being active on a social media service like Facebook.  However, we’ll leave it up to you to choose your level of exposure and if posting online personal information is worth the associated costs.

This concludes the first part of our Facebook and Privacy article.

We’ll pick it up next week.  Stay tuned!


[1] https://www.ctvnews.ca/
[2] https://www.wired.com/
[3] https://en.wikipedia.org/
[4] https://news.sky.com/
[5] http://www.nzherald.co.nz/
[6] http://money.cnn.com/2018/03/19/
[7] https://www.ctvnews.ca/
[8] http://money.cnn.com/2018/03/19/
[9] https://www.parliament.uk/business/committees/
[10] https://www.theguardian.com/uk-news/2018/mar/22/
[11] https://www.ctvnews.ca/business/
[12] https://www.theguardian.com/uk-news/2018/mar/22/
[13] http://www.metronews.ca/life/2018/04/04/

Filed Under: Blog, News, Newsletter, online privacy Tagged With: Facebook, identity, privacy, security, social media

What Is a VPN, and Why Do You Need One?

April 28, 2017 by Charles Edward

In March 2017, the US Congress voted to allow internet service providers (ISPs) to sell customer data. Anyone in the United States who connects to the Internet must rely on an ISP. This means your ISP now has knowledge of all of your browsing habits.

While ISPs claim they will use your Internet history to help sell you more relevant ads, the decision by Congress has made many people deeply uncomfortable.

WiFi Hotspots Are Also A Risk?

It’s not just ISPs who are after your browsing data and personal information. For example, whenever you login to a WiFi hotspot in a coffee shop or at the airport you are potentially putting yourself at risk. WiFi hotspots may not protect your data as it is transmitted to and from your device. Even worse, some WiFi hotspots may want to steal your data, such as browsing history or even passwords and credit card information.

Luckily, something called a virtual private network (VPN) may help protect you from ISPs and anyone else who wants to snoop on your Internet habits.

What Is a VPN?

A VPN is essentially an online service that allows you to create a secure Internet connection. All of your browsing is encrypted, meaning that no one, including your ISP or even the government can determine what you are doing on the Internet.

How Does It Work?

When you connect to a VPN, you usually launch a VPN client on your computer (or click a link on a special website), log in with your credentials, and your computer exchanges trusted keys with a far away server. Once both computers have verified each other as authentic, all of your internet communication is encrypted and secured from eavesdropping.

There are two main advantages to using a VPN:

Advantage #1: Browse Privately and Safely

As mentioned, all of your browsing information is encrypted. This means that your ISP cannot sell your data to a third-party for advertising. VPNs also ensure that your passwords and banking information are kept safe, too.

For example, many journalists and businesspeople traveling abroad use VPNs to protect their privacy.

Advantage #2: Browse Everywhere

Businesspeople and journalists may also use VPNs just to be able to communicate. For example, the Great Firewall of China prevents Internet users from accessing many useful websites from outside of China. Many people rely on VPNs to access indispensable online services for their jobs.

On the other hand, VPNs are also useful because they allow you to browse as though you were in any country. Many online content providers such as Netflix, Hulu and the BBC restrict access to content based on your country. You can use a VPN to get around these rules.

What to Look For In a VPN

Not all VPNs are created equally, so it’s important to look for the right one before making a choice.

Look for:

Speed

If you want to use a VPN in order to watch online content such as Netflix, make sure it has enough bandwidth to do so. Generally speaking, this bandwidth is a result of investments in server capacity and other technology. Some VPNs have more than others.

Your Data Must Be Kept Safe

Almost anyone with a little technical know-how can setup a VPN service and then sell it to consumers. The problem for you is: how do you know they’re going to protect your data?

Look for a VPN with a professional website and an active and responsive social media presence. And, if you’re really concerned with privacy, look for a VPN that has its servers in a country with strong data privacy laws. In countries such as the United States and the United Kingdom, government now has broad powers to access your data.

Countries such as Canada, Germany and Switzerland have much stronger rules prohibiting government collection of personal data, so look for a VPN headquartered in one of those countries first.

When Can a VPN Not Protect Your Privacy?

Even if a VPN does not share your personal information, there are others who can. For example, Google and Facebook both use your profile data, which includes browsing history, to sell advertising. A VPN is not designed to prevent this from happening–protecting yourself from Facebook and Google’s efforts to collect data is best done using browser-based ad blocking tools.

Also, keep in mind that you typically choose to use Google and Facebook because you agree to trade some privacy for the convenience of their services.

However, since you pay ISPs directly, you should expect that your privacy be respected. But since ISPs and others are not respecting your privacy, it may be a good time to use a VPN.

What We Recommend: SecureVPN

SecureVPN allows you to surf the web anonymously, unlock websites, unlock VoIP services, secure any wifi hotspot, and protect your data & privacy.

SecureVPN operates a self-managed VPN network with at least 750 servers in 141 countries, with plans to add more.

Since there are so many local servers, this means SecureVPN promises the fastest speed possible. SecureVPN also owns its own network–there are no third-parties that gather data, and SecureVPN keeps no logs of your activities.

Why choosing SecureVPN?

SecureVPN offers a variety of features, including:

  • No 3rd Parties for Your Data: SecureVPN has a self-managed network. Your data is handled by SecureVPN only, without the intervention or interference of any third-parties.
  • Military-grade Encryption: SecureVPN employs top-of-the-line military-grade up to 256-bit encryption to protect and safeguard user’s data from falling into the wrong hands.
  • 750+ Servers in 141 Countries: SecureVPN has servers in 141 Countries. So, no matter where you are or where you travel to, SecureVPN will connect you to your favorite content.
  • 99.99% Uptime: SecureVPN has its own network of servers and a team of highly professional experts who manage and host the network to guarantee 99.9% uptime.
  • Powerful Software and Apps: SecureVPN wrote its own code for its proprietary software and apps for every major platform including Windows, Mac, iOS, Android, and Linux.
  • Unlimited Data Transfer: Download, browse, stream or share, SecureVPN users are free to do whatever they want, how much they want since there is no bandwidth or data limit.

 

Filed Under: Blog, online security, PC security Tagged With: online safety, privacy, vpn

Breaking News – Yahoo Admits Breach of 500 Million Accounts

September 22, 2016 by Andy Thompson

My heart dropped when I was alerted by CNN that Yahoo admitted today that 500 million user accounts have been compromised. As a seasoned IT professional who has been involved with the security industry for the past decade, this is probably THE worse security breach that’s occurred since the inception of the Internet.

Here are the key facts that you should be aware of regarding this breach:

  • In August 2016, a person codenamed “Peace” attempted to sell what he claimed to be 200 million Yahoo user information.
  • Back then, Yahoo only said they were investigating the legitimacy of the claim.
  • On Sept. 22nd 2016, Yahoo issued a statement acknowledging the legitimacy of the claim. Furthermore, Yahoo confirmed the scale of the breach is actually 500 million accounts.
  • Yahoo also confirmed that the information stolen contains name, username, lightly encrypted passwords, date of birth, and for some accounts, security questions and answers.

Nevertheless, till this moment, Yahoo hasn’t issued a notice to all of its users advising them to reset their passwords.

Here at CompuClever, we felt it is necessary to inform you about this event because there is a high possibility that either you or someone you know might be impacted by this incident.

Yahoo is currently working with law enforcement agencies, including the FBI, to deal with this breach. Nevertheless, we recommend you immediately take the following measures to protect your online security and personal privacy:

  • Immediately change your Yahoo email password.
  • If you happen to be using the same combination of username and password across multiple (non-Yahoo) online accounts, change all of the passwords. Make sure that you use a different password for every account.
  • Ensure you have a legit and reputable antivirus protection with active subscription to protect your PC from any forms of cyberattack.

Further readings:

  • How to protect yourself in a post-password world
  • How to create a good password
  • Safe guard your online banking
  • Stay safely connected

Filed Under: Antivirus, Blog, CompuClever Antivirus PLUS, online security, PC security, Protect online privacy Tagged With: online security, privacy, security breach, Yahoo

Firewalls – First Line Filtration

June 28, 2016 by Andy Thompson

If our PC could be considered a well-protected fortress, we would think of the firewall as an essential part of the moat and drawbridge system – it monitors and controls entry. Most of us associate firewalls with large network corporations and sophisticated security systems. You might, however, be surprised to find your PC and personal devices have security issues similar to large corporate networks. This is why firewall technology is built into your PC and offers the first line of protection from offensive web sites and potential hackers.

We’ll begin with a definition of what a firewall is and then move into some basic questions and answers.  After that we’re going to provide information for those that might want to beef up their firewall protection.

The Firewall Basics

Effectively a firewall is a filter.  It is designed to prevent dubious programs and Internet services from establishing a connection or gaining access to your computer.

Firewall Defined: A firewall is hardware or software technology designed to monitor and filter incoming and outgoing traffic to your PC.  It is a network security function that effectively acts as a barrier.  The data that passes through depends on the pre-determined set of rules which are configured in the firewall settings.

A Little Q and A

Now that we know basically what it is, we can answer some questions.

  1. Why do I need one?

A firewall tries to screen out incoming Internet streams of data from unwanted sources and it also prevents programs on your PC to access the Internet without authorization.  The purpose is to prevent unwanted and malicious programs from communicating to, or from, your computer.

  1. Who makes firewalls?

Microsoft includes a firewall with Windows – we’ll cover this in more detail below.  There are also a significant number of known makers of free and paid solutions.  The best known names would include Norton, McAfee, BitDefender, Kaspersky, as well as Zone Alarm, Webroot, and Comodo.  Some routers also have firewalls built into them.  While we are not recommending any specific option, selecting one of the manufacturers listed above should provide greater security.

  1. When do I need one?

Quite simply – you need a firewall when you connect to the Internet. This is why you should also consider a solution for your smart phone or mobile device.  Most malware programs these days attempt to get money from you and your mobile devices are also targets of malware attacks and cyber crime.

  1. Doesn’t Windows already come with a firewall?

Yes, it does, and it may be all you need.   It blocks unwanted connections and will prompt you if you want to allow a connection or not.  There is a list of programs to block and you can enter exceptions to identify programs you deem safe.

Windows Firewall is equipped to monitor traffic, but lacks in the area of program control.  Despite shortcomings, Windows Firewall may be all you need.   Other tools will provide additional functions such as the ability to create activity logs.  In this way you can review what was happening in terms of attempted connections so you can fine tune the security parameters.  The bottom line is that the Windows Firewall will suffice for most users and should not be regarded as providing insufficient security.

If you find surfing the net is slow, begin by optimizing the browsers and Windows configuration for accessing the Internet.  We recommend looking at the articles: Improve Internet Speed and Restore Browser Speed.  After this, if you are more certain that the firewall is affecting performance, you may want to replace it.  If your PC is encountering issues with viral infections then first look at your antivirus protection, and if you have a top notch AV solution and are still getting breaches, that too would be a reason for looking for a new firewall.

  1. Is a firewall all the protection I need?

In a previous article we covered some myths about antivirus protection and this came up.  We can review briefly here.  As we have described, firewalls can filter nefarious traffic.  However, they cannot protect your PC from files that contain a virus or Trojan.  The reason for this is that firewalls are not able to scan for infected files – you need an antivirus solution specific to this purpose.

Cyber criminals exploit potential security holes and look for ways to openly connect with your PC.  A firewall can minimize this risk and offer the first line of defense.  However, it is not sufficient in blocking the myriad of virus and malware threats that are prevalent.  Malware creators are very clever in disguising data and can even disable your firewall in an effort to steal private or personal data.

Antivirus Protection:In a nutshell… we are pleased to offer CompuClever Antivirus PLUS, an AV solution that delivers 100% protection against both known and unknown viruses, comparable to any first-tier antivirus software like Norton, Kaspersky, Bitdefender, and MacAfee.  As a matter of fact, an independent third-party lab test revealed that our antivirus product not only delivers a high level of protection, it also creates a very low impact to PC performance.

For more information about CompuClever Antivirus PLUS click here: Are You Well Protected?

Turning Windows Firewall On and Off

Microsoft states: “You only need one firewall app on your PC (in addition to the firewall that’s probably built into your network router).  Having more than one firewall app on your PC can cause conflicts and problems.” [1]  It is also good practice to NOT turn off a firewall unless you have another one turned on.

With these safe practices in mind, you can view the status of Windows Firewall and you can turn it off or on.  The easiest way to begin is to type “firewall” in the Search field located in the Start menu.  For more information and instructions specific to your operating system follow one of these links:

Windows 10  / Windows 8 / Windows 7 / Windows Vista / Windows XP

What to Consider if Seeking an Alternative

Here is our list to help you better decide on alternatives to the built-in firewall for Windows.

  1. You need to consider how accurately a firewall solution will identify threats to your system. You do not want it to miss threats but you also do not want it blackball safe and known programs.  No one wants an unending stream of warnings from their firewall for no valid reason.  The very best firewalls handle unknown programs by monitoring them closely for suspicious activity and signs of improper network activity behaviour.
  2. The fewer resources it requires the better. This will allow your system to run programs faster and dedicate resources to perform duties related to regular day-to-day activities.
  3. Supply only the functions you need. Some “suite” applications will include antivirus and performance tools.  If you already have these areas covered by other applications there is no need to pay for bloated software that is inadequate in these other areas.
  4. You will also need to know what kind of coverage you require in terms of the devices you are needing to protect (desktop, laptop, tablet, or phone), and if your solution will suffice.

Other Considerations

Now to finish off with some final points related to installing a new firewall solution.

Install Your Firewall 

There isn’t any one “right” place to install a firewall; it comes down to the devices you use and the programs you run.  If you are looking for a firewall for your business then the normal firewall is not what you need; you need what is known as a “Next Generation Firewall” or, “NGFW’.  These are more sophisticated and expensive, ranging from $500 to $80,000, and are beyond what we will discuss here.

Also, some routers have firewalls built right into them, meaning any system behind them does not need a firewall.  This is useful as it means that there is no performance loss for Windows as a result of a firewall performing checks on data streams.  However, if you have a portable device (like a laptop, tablet, or phone), then you need a firewall installed to the device that can be turned on whenever you connect to the Internet when away from home.

Common Problems

The most common problem in using a firewall is blocking a program you know is good.  When this happens you need to create an “exclusion” or “exception” (search the program help files for those terms).  Effectively, this provides you the ability to override what the firewall would normally do.  Firewalls are designed to run in the background so most people have little to no interaction with these programs once they are installed and exceptions are generated.

Summary

While we haven’t gone into detail about hardware and software firewall technologies and the various viral threats to firewalls, we have covered the basics.  Standard coverage should get you started and you have the option of customizing the onboard Windows Firewall.  As an alternative to Windows, you can follow our introductory guidelines for taking on an alternative firewall solution.  In either event, remember that an effective antivirus solution is part of your fortress of protection.

We would like to thank Richard from our Tech Support team for his first wave of research on this subject.  We will continue to provide story lines like this and we will describe them in a manner that is within reach of everyday computer users.  If you have some ideas of topics you would like us to cover, email us at: newsletter@compuclever.com


[1] http://windows.microsoft.com/en-US/windows-8/Windows-Firewall-from-start-to-finish

Filed Under: Antivirus, Blog, online security, Windows tips Tagged With: antivirus, firewall, privacy, security, windows tips

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.