PC Security


Unless you are a serious electronics buff, there is a good chance your home PC is the most expensive piece of equipment in your home. Or if you've got a notebook, it is likely to be the most expensive thing you carry around in a bag.

Although your insurance policy may cover the costs of replacing hardware if it is stolen, there isn't anything that money can do to retrieve your precious or personal data. Nor is there anything you can do to stop the thief from finding those confidential details you keep on the system. Maybe the thief isn't interested in physically stealing your PC from your home; instead, they just want that 16-digit number from your credit card. Or perhaps they want to steal your processor time and network bandwidth to attack someone else.

These are but a few of the reasons why all computer users should take the time to consider how to mitigate their PC security risks.

The threats to your home PC or notebook can be correlated to the multitude of security products available. Physical security products are used to deter theft of the computer hardware. Network security products include personal firewall software, hardware devices and, to some extent, antivirus applications. These are important to anyone who uses the Internet, and are vital for users with broadband connections at home. Access security products involve software or combined hardware and software solutions which control who has access to your computer. Data security covers password protected files, encryption and secure deletion.

Faced with the sheer volume of products now being offered, and with many computers and operating systems now including some of these security capabilities, it is important for users to understand their needs first before they decide in which products to invest.


First things first: Nail it down (Back to contents)

The idea of physical PC security is as simple as it is essential. Keeping people you don't trust away from your PC by locking the door is a great start - just being able to get to a PC's floppy drive and power button makes it quite easy to break into many systems. But if you've left your PC somewhere public or a would-be thief is already in your home or office, then there is still the idea of locking your computer to something immobile.

Most notebooks have a small opening on the side or back which is intended for third-party locks. There are many options on the market - some as simple as a lock with an attached steel cable for looping around a table-leg, others with locking plates and super glue to create anchor points. For the gadget fans, there are also many cables and locks with in-built motion-sensors and high-decibel alarms. Cables and locks are available in the $60-90 range, with motion sensors around $90-100.

For desktop systems, there are versions of the same - anchor points with special glues, cables and alarms. And to prevent access to drives, there are locks that attach to the case and physically prevent anyone from opening the CD/DVD drive or putting in a floppy disk. There are also chunkier enclosures available that physically surround the PC or PC and monitor, requiring a lot more effort than a pair of bolt-cutters to remove.

Should the thief manage to steal your computer anyway, several companies offer a tracking and recovery service. The recovery services work using software agents installed on your computer. Each time the computer is connected to the Internet it contacts the recovery service and sends either its current IP address or the phone number from which it is calling, allowing the computer's new location to be identified and police informed.

Back to top


Keeping them out (Back to contents)

Ensuring that only the people whom you want to have access to the computer system can access it is the task of access security mechanisms such as authentication. The first step is to use system accounts with usernames and passwords to control access to the computer. Having a strong password is the easiest method of greatly increasing the security of your computer and the privacy of the data residing on it. Using a weak password that's easy to guess (such as the username) isn't much of a hindrance to authorised users trying to get in.

Most operating systems with accounts have policy enforcement mechanisms that allow control over such characteristics as the complexity of a password, how long it can be used, what times or days it can be used to log in to the system and, most importantly, the ability to lock out an account after too many mistakes. This is used to stop people from using programs that keep guessing passwords until they can break in.

If your operating system doesn't support user accounts, consider if protecting your files using an encryption utility (see "Keep it secret" below) is sufficient for your security needs. You can also try using the BIOS; on many computers, passwords must be entered before they will boot an operating system. If encryption or BIOS passwords aren't the answer, upgrade to an operating system with system security built in, such as Windows 2000/XP, Mac OS X or any UNIX-style system.

Taking it a step farther, there are many new products available which replace the password with additional forms of identification, making password guessing next to impossible. It is now easy to pick up fingerprint scanners that work with your operating system to control access, PC card devices for notebooks, and USB devices for either notebooks or desktops. There are also smart card systems that require the user to insert a card into a reader at the same time as entering a password. Both PC card readers and fingerprint scanners are usually available for around $400-$500.

Just having a strong password isn't necessarily enough, however, if you are in the habit of leaving your computer logged in and wandering off for a cup of tea. To combat this opportunism, you need to configure your operating system to either lock the user account after a pre-determined interval of inactivity or to use a password-protected screensaver.

Back to top


Don't forget to lock the back door as well (Back to contents)

Often the easiest way to get into a computer is via the network. Not only do many Internet-connected PCs have network file shares with no passwords required, but attackers can also use bugs in parts of the operating system which listen to the network to break in remotely. Additionally, if your PC is connected to a broadband connection permanently, then it becomes an even more likely target for misuse.

To protect your PC from network threats, you can either read up on the subject and become a security expert, then patch and configure your operating system in a secure manner, or you can take the easy approach and get a personal firewall. Companies such as Linksys and Netgear sell hardware firewall solutions - small devices that plug into your modem, cable modem or ADSL modem on one side and your PC on the other. Typically, these devices use network address translation (NAT) to hide your PC from the network. NAT does this by assigning your computer an IP address that it isn't possible to use on the Internet, which makes it effectively invisible. Therefore the only place a would-be intruder can attack is the secure interface the firewall uses to talk to the modem, which is designed especially for this purpose. Hardware firewalls suitable for broadband home users cost $200-600 depending on additional features such as in-built 802.11b routers.

Higher range devices include firewall software that provides better flexibility for controlling network traffic, but the downside to these hardware devices is that they often stop programs like ICQ or Windows Messenger from working without special configuration. However, they usually have a few network ports on the inside so can protect a home network instead of just a single PC.

Back to top

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

PC World Staff

PC World
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?