• Menu
  • Skip to right header navigation
  • Skip to main content

The Web Elves logo 346x72

Intuitive Hand Crafted Websites, Audio-Video, Networking, SEO

  • About / Contact
    • Terms Of Service
    • Testimonials
  • Computer Security
  • Web Design
  • Graphic Design
  • Web Hosting
  • SEO
    • SEO Book
    • Basic Tips
  • Technical Support
  • Video
    • Higher Ground TV
  • WordPress
  • Contact
  • About / Contact
    • Terms Of Service
    • Testimonials
  • Computer Security
  • Web Design
  • Graphic Design
  • Web Hosting
  • SEO
    • SEO Book
    • Basic Tips
  • Technical Support
  • Video
    • Higher Ground TV
  • WordPress
  • Contact

Computer Security

Simply using basic protection methods already available to you can deter most security breeches. Yet, it is surprising how many major corporations do not fully utilize rudimentary, yet ever changing, safeguards. Don’t put yourself in generic and default operating modes that leave you open to commonly found weaknesses. Protect yourself with know-how.

In the old days when the pen was mightier than the sword, information was kept under lock and key. Today, when information can be more valuable than gold, our locks and keys are virtual. Just as knowledge is the key that unlocks doors, it takes knowledge to lock them as well. Protect what is yours by minimizing the risks. Technicians from our Computer Sciences department have researched, compiled and condensed information to show you how. Come under the umbrella of Protective Countermeasures and let the expertise of our specialists work for you.

Alerts from the:
US Computer Emergency Readiness Team (CERT)


Documentation also includes…
Selected Computer Security Links
  • Glossary of Virus Terms
  • Computer Emergency Readiness Team (CERT): Tips
  • Common Vulnerabilities and Exposures (CVE)
  • National Vulnerability Databse (NVD)
We help you understand …
Basic Security Awareness for Your Business Computer Network:
  1. What are the threats to your network?
  2. What kind of protection is available for a network?
  3. What kind of protection do you need for “your” network?
  4. Several things to ensure that security is routine
  5. Main steps in formulating the security policy

My computer and the internet:

  1. Security for the Internet, broadband, and your computer
  2. What’s the worst that can happen?
  3. How can they do this?
  4. Why would they go after me?
  5. Why not just turn off my computer?
  6. What can I do to protect myself?

Wireless Security at a Glance

  1. Basic Wireless Security
  2. Password and Username
  3. Encryption
  4. Broadcasting
  5. Filtering
  6. Device Addresses
  7. Defaults

Department of Homeland Security
On the Web – Sponsored by the U.S. Department of Homeland Security (DHS):

Cyber Security Links:
Computer Emergency Readiness Team: (CERT) Cyber Security Tips
Common Vulnerabilities and Exposures (CVE)
National Vulnerability Databse (NVD)
Cyber Alerts from CERT:
RSS Feeds, Tools, Guides, Summaries & More

Copyright © 2025 · The Web Elves · Log in