Closing the Door on Internet Predators

ByABC News
January 12, 2007, 4:11 PM

Jan. 12, 2007 — -- As computer technology advances, so do the methods used by those looking to take advantage of your home computer. It is surprisingly easy for others to gain access to your family's computer without your permission. Once they have access, virtually nothing on your hard drive is safe.

ABC News spoke to Paul Davis, vice president and program manager for the Enterprise Security Strategic Program in Unisys's global outsourcing and infrastructure services group.

Davis has more than 19 years of experience protecting individuals and businesses against computer-based security threats.

Here are some tips from Davis on how to protect your home computer from Internet predators.

The first and most fundamental step in protecting your home computer against hackers and those trying to gain access without your permission is to purchase an up-to-date virus package with up-to-date virus signatures.

"Choosing the right package is important," says Davis. There are protection packages available with anti-virus, firewalls and anti-spyware software. These offer multiple levels of protection and are, therefore, more comprehensive.

Even though most protection packages should automatically update your virus signatures, you should manually update them, as well. Also, make sure your software is enabled. Like turning on a light switch, if your software isn't enabled, it isn't protecting your computer.

Site-blocking software can also help. It stops you from going to disreputable sites that have a higher likelihood of exposing your computer to hackers.

Scan your computer for viruses regularly. Davis suggests once a week. One key indicator that your computer has viruses, or has been tapped by an unauthorized person, is if the machine seems to function slower than it does normally.

According to Davis, "People think that because their computer is in their home, they are safe." Unfortunately, locking the front door to your house does not lock the door on Internet predators.

Stick to reputable sites and always check the spelling of a Web site. Often, those looking to get into your computer will do so through sites that, at first glance, appear to be well-known names, with just a slight difference in the spelling of the site name.