Securing your laptop/other connected devices?
Last updated
Last updated
A portable computer.
Information also applicable to Desktop PCs.
Passwords: It is likely your social media and email passwords have been saved on the laptop.
Plug-ins
Spyware
Find My Device Apps
Unauthorised access to file storage
Tracking apps
Mobile (bug)
Webcam: Hacking into a webcam is common and can lead to an abuser recording you without your knowledge. The webcam could be recording even if its light isn’t on.
Change all passwords.
Two-factor authentication (see References)
Encrypt the hard disk so only you may access it.
Don’t share your laptop with anyone you don’t completely trust.
Ensure there is no malware or spyware on your laptop (see 10 Warning Signs that your computer is Malware Infected and Is my PC infected with viruses or spyware?).
Update your antivirus software regularly (Avast). Most antivirus softwares have an ‘auto-update’ option.
Cover your webcam lens with tape, a removable sticker or piece of paper at all times.
High threat level: If you know or suspect that your laptop has been tampered with by the attacker, do not use it straight away. Do not connect it to the internet and run installed malware programs to check for tracking or bugging software. The best way to be safe is to wipe the laptop (see more under References). Only use laptops you fully trust (i.e. those belonging to people you trust).
Playstation, PSP, XBox, Wii, etc.
Chat function (Abusers can chat with you/your child pretending to be someone else.)
Video chat function (Many consoles have access to a webcam.)
Geotagging photos (This can show your home location.)
Some multi-player games can allow players to gain access to your IP address.
Enable parental controls. (They will not be automatically switched on.)
Deny access to webcam on consoles.
Don’t use an identifiable username.
Don’t upload photos.
Teach kids that use your console about gaming safety especially regarding online conversations during games.
High threat level: Get rid of your gaming device
VULNERABILITIES
ACTIONS
VULNERABILITIES
ACTIONS