Scroll Top

Security Tip’s : For Desktop/PC


Introducing  Desktop  Security

The Desktop Security Policy is downloaded by the Security Management server to a Policy Server, a module installed on a Security Gateway, which serves as a repository for the Desktop Security Policy. Client machines download their Desktop Security Policies from the Policy Server.
When a client connects to the organization’s Security Gateway to establish a VPN, it can connect to a Policy Server as well and retrieve its Desktop Security Policy and begin enforcing it. Clients can accept, encrypt or drop connections depending on their Source, Destination, and Service.
Information technology security is like an onion whose layers protect computer users from hackers. If a computer is not protected at the personal level, it could allow a hacker to send thousands of illicit e-mails and cause you to lose your network access. You can protect yourself from the average desktop hacker by being aware of some of their common tactics.

The Need for Desktop Security

A Security Gateway protects a network by enforcing a Security Policy on the traffic to and from that network that passes through the Security Gateway. A remote client, located outside the protected network, is vulnerable to attack because traffic to the remote client does not pass through the Security Gateway — no Security Policy is enforced on this traffic.
There is a further danger: an attacker might gain access to a protected network by compromising a remote client, which may in turn compromise the protected network (for example, by relaying a virus through the VPN tunnel). Even if the Security Gateway enforces a very restrictive Security Policy, the LAN remains vulnerable to attacks routed through unprotected remote clients.
Why do you need to secure your Desktop?
We need to secure our desktop because a personal computer used without proper security measure that could lead to exploiting the system for illegal activities using the resources of such insecure computers. These exploiters could be Virus, Trojans, Keyloggers and sometimes real hackers. This may result in data theft, data loss, personal information disclosure, stealing of credentials like passwords etc.
My Post (6)


  • Keep operating system patches up to date
  • Use encryption to securely encode sensitive information
  • Install antivirus software; configure for daily updates
  • Install and configure a personal firewall
  • Keep application and software patches up to date (e.g., Microsoft Office, browsers, etc.)
  • Follow best practices when opening email attachments
  • Follow secure password policies
  • Follow best practices for user account security
  • Eliminate unnecessary network services, applications, and processes
  • Avoid peer-­‐to peer file sharing
  • Install and configure anti-­Spyware programs
  • Configure system restore points to protect your current configuration
  • Perform regularly scheduled backups to protect data
  • Turn off computer when not in use; restrict physical access to computer
Things to remember  while using your personal computer
  • Always install Licensed Software so that you have regular updates of
    your Operating system and Applications. In case of open source
    software, make sure to update frequently.
  •  Read the “Terms and Conditions” / “License Agreement” provided by
    vendor/software before installation.
  • Properly shutdown and switch off your personal computer after the
    use along with your external devices like Monitor, Modem,
    Speakers etc.


Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.