Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

How to do Norton Setup from www.norton.com/setup?

Author: Tony Smith
by Tony Smith
Posted: Sep 18, 2018
10 BEST PRACTICES FOR EFFECTIVE www.norton.com/setup SECURITY

Despite firewalls, antivirus software, security services, and identity protection, there are still many cybersecurity vulnerabilities that you should keep in mind. Follow these 10 best practices, or basic rules, in order to help maintain your security on the web.

Use secure passwords with norton.com/setup

You may (or may not) be surprised to find out that the three most common passwords are "123456," "password," and "12345678." Don’t use those. The ideal password is a random collection of letters, numbers, and some symbols, but that’s not a password that most people will be able to remember. To simplify things, a good rule of thumb is to include at least 1 number, 1 uppercase letter, and 1 symbol in whatever word(s) you choose to use.

Don’t reuse passwords

This is a password mistake that most people don’t think about. You never know exactly when a password is compromised. Most applications or software will make you change your password every 6 months to a year for that reason. Don’t use the same password across different accounts, either. If a hacker gets the password to one account, they have it for all accounts.

www.norton.com/setup recommends Be suspicious of external downloads and emails

Go with your gut on this one. If something smells fishy or feels off, it probably is. Phishing emails are designed to seem like they are being sent from a real person or company in order to obtain information from you. A spyware download may also look like a genuine file. Bogus security experts may also claim that your computer has a virus and that they’ll take care of it for you—usually for a fee or remote access to your computer. If you think it’s fake, don’t even open it. You can try to determine if it’s fake by looking for inconsistencies in the sender’s address or subject line.

About the Author

Freelancer content writer and digital marketer. Webroot Safe

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Tony Smith

Tony Smith

Member since: Sep 18, 2018
Published articles: 4

Related Articles