Security Tips for Computers and Laptops
A Note on Language
In this toolkit, we will sometimes use the word woman/women and feminine pronouns for simplicity and to recognize the significant impact technology-facilitated violence has on women and girls. We recognize that TFGBV also impacts trans, non-binary, and Two-Spirit people. We hope that all people impacted by TFGBV will find these documents useful.
The computer (or laptop) is a common item in most households. It sits in the corner for the kids to do their homework or for us to check email and maybe pay a bill or two. At the office, we log in to it every morning and turn it off each evening.
Computers can be a vulnerable technology that perpetrators, both those you know and those you don’t, can exploit to gain information about what a woman is doing. While a computer may not be as intimate to us as a smartphone, it still contains a lot of personal information, from email accounts to web browsing activity, from filling out forms and documents to saving and storing important information.
The only way to completely prevent someone from accessing your computer is to keep it disconnected from the internet or other network (such as a home network, even if it’s not connected to the Internet) and put a passcode on your computer so that only you can access it. If you are concerned that someone might be getting into your computer, and you’re comfortable with disconnecting it from the Internet, this might be an option. For most people, however, disconnecting from the Internet prevents them from doing what they need their computers to do. So, whether you’re setting up a new computer or just reviewing your computer’s settings, here are some privacy and security tips.
Prevention And Protection
These are some ways to minimize another person’s ability to gain access to your computer.
Turn on Firewall Protections
Most computers and laptops (as well as tablets and mobile devices) come with firewalls already installed. Firewalls monitor data that is sent to and from your computer; when data with potentially malicious software is detected, it will prevent that data from being communicated to your computer. Essentially, a firewall will protect your computer from someone who is trying to hack it through its open connections.
On most Windows operating systems, firewall protections are turned on by default. Mac and Linux operating systems have the firewall turned off by default, but you can turn it on. To see if your computer’s firewall is on, check the firewall settings under the Control Panel (for Windows operating system) or System Preferences/Security & Privacy (for Macs).
Run Anti-Virus and Anti-Spyware Software
To protect your machine from viruses and spyware, you should install and run anti-virus software. Anti-virus software will scan your computer and files you download for viruses and, if it detects any viruses, will prevent installation. Some software may quarantine the virus to keep it from infecting your computer while others will remove the virus.
Anti-virus software relies on virus definitions to detect the virus; however, cybercriminals are constantly changing viruses to infect devices. For this reason, make sure your anti-virus software is running the latest version. Most anti-virus definitions will update automatically. If yours do not, set up your anti-virus software so it does.
Anti-spyware is similar to anti-virus software, but it’s specifically for spyware. If you’re concerned that the perpetrator might be installing spyware on your computer remotely, running anti-spyware can be helpful.
Anti-virus and anti-spyware software will not completely prevent malware from being installed. However, it will increase your computer’s protection. There are many free anti-virus/anti-spyware products available for the home user. Check online reviews for “best free anti-virus or anti-spyware” to make sure these programs meet your specific needs.
Turn Off Remote Access
If you’re worried about someone remotely accessing your computer, either legitimately or without your permission, you can turn off its ability to allow remote access. You can always turn it back on if you need remote access to your computer.
How you turn off remote access on your computer depends on the operating system you are running. On a Windows computer, you want to turn on the setting that says: “Don’t Allow Remote Connections to this Computer” (generally found under the Control Panel). If you have a Mac, go to System Preferences/Sharing, and uncheck “Remote Login” and “Remote Management.” The best way to find specific instructions for your computer is to Google “how to turn off remote access to [your operating system (e.g., Windows 11)].”
Disable File Sharing
If your computer is connected to a network (even if it’s not connected to the Internet), other devices that are connected to the same network can access the files on your computer. This may be a concern if you’re connected to a public Wi-Fi network and you have your settings set up to share. If you don’t need someone else to have access to your files, disable file sharing.
How you disable file sharing depends on the operating system you’re using. The best way is to Google “how to disable file sharing on [your operating system (e.g. Windows 11)].” For most Windows operating systems, the setting will be under the Control Panel and you want to select “turn off file and printer sharing.” For a Mac, go to System Preferences/Sharing, and uncheck “file sharing” and “printer sharing.”
Use a Non-Admin Account for Everyday Use
Some malware and “hacks” require administrative access to your computer. This means that if you’re signed in as an administrator on your computer and accidentally click on a link that has malware embedded, it will download and install. However, if you are signed in to your computer as a non-administrator and set it up so that a non-administrator account cannot install software, it won’t install even if you accidentally click on a link with malware.
It is, therefore, helpful to create a non-administrator account on your computer for everyday use. You can always log in on the administrator account if you need to install software or make changes to your computer. Both Windows and Macs allow you to create multiple users.
Practices to Enhance Computer Security
In addition to computer settings that you can turn on or off and running software to help protect your computer, there are other good practices that you can use to increase your computer’s security and your privacy.
Put a Password on Your Computer
Locking down your computer with a password is the first thing you can do to prevent someone from gaining access to your content. While most people are worried their computer will be “hacked,” the easiest way for someone to gain access to your computer is simply by having physical access to it, either because they have stolen it or are in your home. Remember, it is easier for someone who you’ve been in a relationship with to guess your password and have access to your device.
Don’t Click on Unknown or Suspicious Links
Another good practice is not to click on links or attachments from suspicious people or websites. Because malware can sometimes be embedded in these links or attachments, opening one could install the malware. If you need to receive files or open links from an abusive person or someone you don’t trust, consider using a cloud-sharing service to share files or communicate the information in another way.
Log Out of Accounts and Quit Programs
When you finish using an online account, a program on your computer, or even the computer itself, quit and log off. Leaving accounts and your computer logged in could make it easier for someone else to get into your accounts. Even if you don’t think someone has physical access to your computer, it’s always best practice to log out when you’re done.
Turn Off Access Points When Not in Use
Turn off Wi-Fi, Bluetooth, Airdrop, or other connectivity access on your computer if you’re not using it. If the access point isn’t open, it will be harder for someone to connect remotely. You can always turn it on when you need to connect.
Technology-Facilitated Gender-Based Violence (TFGBV) is part of a continuum of violence that can be both online and in-person. If you or someone you know is experiencing TFGBV, you are not alone. You can use sheltersafe.ca to find a shelter/transition house near you to discuss options and create a safety plan. You don’t need to stay in a shelter to access free, confidential services and support.
Adapted for Canada with permission from WESNET’s Tech Safety project, based on their resource Computer and Laptop Security Tips.