Comments on: Securing Your Holiday Tech Gifts, Part 1: Windows PC Guide http://www.welivesecurity.com/2012/12/13/securing-your-holliday-tech-gifts-part-1-windows-pc-guide/ News, Views, and Insight from the ESET Security Community Mon, 03 Feb 2014 08:49:00 +0000 hourly 1 http://wordpress.org/?v=3.7 By: Aryeh Goretsky http://www.welivesecurity.com/2012/12/13/securing-your-holliday-tech-gifts-part-1-windows-pc-guide/#comment-3811 Wed, 19 Dec 2012 19:27:12 +0000 http://blog.eset.com/?p=16140#comment-3811 Hello,

Most computers that are purchased these days come with some sort of security software on it.  Although it may just be a trial version, it is going to provide some basic level of threat protection.  And if the customer isn’t happy with it, they can always replace it some time during, or at the end of, the trial period.

My assumption—and this may be incorrect—is that most people purchasing a computer these days are not new  to having a computer at home, but rather purchasing it as an additional computer, perhaps even to replace an existing one.  In the U.S., most homes already have more than one computer, these days, and this means that the home owner is likely to have a broadband Internet connection connected to a residential gateway broadband router—or that functionality may even be integrated into their modem.  The router provides NAT, SPI and some basic hardware firewall functionality that should break the direct connection the PC has to the Internet and vice-versa.  With the direct connection to the Internet, a computer might be targeted within minutes of being connected, but with a router in place, the direct connection no longer exists it is safe to use the network connection to perform security updates for the operating system and software.  Once the computer is secured, the user can then begin browsing the Internet.

Regards,

Aryeh Goretsky

 

 

 

]]>
By: Allan Greve http://www.welivesecurity.com/2012/12/13/securing-your-holliday-tech-gifts-part-1-windows-pc-guide/#comment-3810 Mon, 17 Dec 2012 15:25:04 +0000 http://blog.eset.com/?p=16140#comment-3810 Why is it that you put a security package at the end of this list? Wouldn't it be better to install this as soon as you have a network connection?

]]>