{"id":1629,"date":"2012-05-29T16:10:32","date_gmt":"2012-05-29T20:10:32","guid":{"rendered":"http:\/\/southjerseytechies.net\/blog\/?p=1629"},"modified":"2025-11-03T11:52:34","modified_gmt":"2025-11-03T16:52:34","slug":"windows-security","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/windows-security\/","title":{"rendered":"10 Commandments of Windows Security"},"content":{"rendered":"<p><span style=\"color: #000000;\">With the introduction of Windows 7, many PC and notebook users may feel more secure than they did using older versions of the Microsoft operating system. Newer OSs have more <a title=\"Microsoft Security\" href=\"http:\/\/www.sjtechies.com\">security features<\/a>, offer better out-of-the-box security settings and have closed many of the historical security holes. Windows 7, for example, has changed the default User Account Control level so that it&#8217;s harder for rogue programs to run without first explicitly gaining the user&#8217;s permission.<\/span><\/p>\n<p>[Also read\u00a03 steps to protect your personal data]<\/p>\n<p><span style=\"color: #000000;\">However, feeling too secure can be dangerous. With that in mind, here are 10 tips&#8211;commandments, if you will&#8211;for ensuring your desktop or notebook computer can be used productively as well as safely. Many of the recommended tools are free, and all are affordable&#8211;and certainly less expensive than the potential problems of an unsecured computer. Similarly, many will take you only a minute or two to perform&#8211;again, far less time than you&#8217;d spend recovering from a security problem.<\/span><\/p>\n<p><span style=\"color: #000000;\">Yes, Windows 8 is on the way; it&#8217;ll be many years before that version runs on a majority of the installed base. So these tips are focused at the computers you are actually using today&#8211;especially Windows 7 computers, though most of the advice also applies to Windows Vista or XP machines.<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>1st commandment: Start with new hardware<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Today&#8217;s new hardware&#8211;motherboards, BIOS, CPUs, hard drives, and the system as a whole&#8211;includes more security &#8220;baked in,&#8221; even before the operating system is installed. Examples include\u00a0<span style=\"color: #000000;\">Trusted Platform Modules<\/span>\u00a0(TPM), which embed cryptographic security directly into the hard drive or other component,\u00a0<span style=\"color: #000000;\">Unified Extensible Hardware Interface<\/span>\u00a0(UEFI) firmware instead of the traditional BIOS, and Intel&#8217;s vPro security and management technologies. For example, machines with UEFI and TPM will, as part of each boot-up, check the computer&#8217;s firmware and boot-up binaries to confirm they have not been infected with malware.<\/span><\/p>\n<p><span style=\"color: #000000;\">If you are working with an existing machine, consider doing a fresh install of the operating system, after completing one (or several) full backup. Ideally, the operating system would be the newest version rather than what was previously installed. (Products like LapLink&#8217;s PC-Mover can reduce the effort of saving and migrating settings and even application software&#8211;although applications should be freshly installed if possible, as well.)<\/span><\/p>\n<p><span style=\"color: #000000;\">Even if you&#8217;re working with an existing machine, consider swapping in new hard drives that include built-in encryption. Drives that support the OPAL Storage Specification standard enable companies to manage encrypted drives from multiple vendors&#8211;and have also helped reduce the extra cost for an encrypted drive from $100 to nearly zero. After-market drives often include migration tools to speed and simplify a drive swap.<\/span><\/p>\n<p><span style=\"color: #000000;\">If a self-encrypted drive isn&#8217;t an option, look at using full-disk encryption software, such as Windows&#8217; BitLocker (available only on Enterprise or Ultimate Windows Vista, 7 or 8 ) or a third-party tool.<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>2nd commandment: Use current OS versions and automatically get OS and application updates<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">If you aren&#8217;t using the most current commercial version of the <a title=\"Microsoft Security\" href=\"http:\/\/www.sjtechies.com\">operating system<\/a>, it&#8217;s time to upgrade. Additionally, make sure you set the software to automatically apply updates (not just the OS, but all applications) and periodically turn off the computer, which is when many updates are auto-applied. An appalling number of\u00a0<span style=\"color: #000000;\">security breaches<\/span>\u00a0occur because applications lack important security fixes that have been available for a year or more.<\/span><\/p>\n<p><span style=\"color: #000000;\">The computer vendor may also include helpful update tools. For example, Lenovo includes an update process that is designed to show all BIOS and driver updates available for that particular model. You can also manually start the update-check apps process. This may take several cycles, particularly for the first time around, if some updates require other updates.<\/span><\/p>\n<p><span style=\"color: #000000;\">&#8220;Third-party software is usually the vector that security intrusions come through, not the operating system,&#8221; says Ed Bott, a Windows expert and ZDNet blogger. Flash, Adobe Reader and Java are three of the biggest targets, Bott says. While many programs include their own automatic update checker, Bott urges using a tool like\u00a0<span style=\"color: #000000;\">Ninite<\/span>\u00a0or<span style=\"color: #000000;\">Secunia Personal Software Inspector<\/span>, which automate update checking for all the applications on your computer.<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>3rd commandment: Use Windows&#8217; new security tools (and\/or third party software)<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Windows 7 includes a number of security controls and tools through its Actions Center (which replaces the Security Center), and other tools are available via the Control Panel, including:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">Windows Firewall: With its basic settings, this wards off basic attacks, and you can use its advanced settings for more specific control. There are also third-party firewall programs available.<\/span><\/li>\n<li><span style=\"color: #000000;\">Microsoft&#8217;s\u00a0<span style=\"color: #000000;\">Microsoft Security Essentials<\/span>\u00a0and\u00a0<span style=\"color: #000000;\">Windows Defender<\/span>. These tools secure your computer against viruses, spyware<br \/>\nand other malware.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Obviously another option is to invest in third-party <a title=\"Microsoft Security\" href=\"http:\/\/www.sjtechies.com\">security software<\/a>, like individual anti-virus, anti-spam and other programs, or a security suite, such as Symantec&#8217;s.<\/span><\/p>\n<p><strong><span style=\"color: #ff6600;\">4th commandment: Set up (or remove) user accounts<\/span><br \/>\n<\/strong><\/p>\n<p><span style=\"color: #000000;\">Historically in Windows, the default account had administrator privileges&#8211;meaning that programs capable of taking unwanted insecure actions wouldn&#8217;t have to first ask the user if they could run. Starting with Vista, Microsoft added\u00a0<span style=\"color: #000000;\">User Account Control<\/span>\u00a0(UAC), which asked non-administrator users for permission to run certain programs or actions. With Windows 7, UAC still protects systems but less intrusively.<\/span><\/p>\n<p><span style=\"color: #000000;\">Even so, managing which user accounts are&#8211;and aren&#8217;t&#8211;available contributes to security in the following ways:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">Establishes non-administrative user account(s) for each user.<\/span><\/li>\n<li><span style=\"color: #000000;\">Disables or removes user accounts that aren&#8217;t used or shouldn&#8217;t be there.<\/span><\/li>\n<li><span style=\"color: #000000;\">Disables the &#8220;guest&#8221; account, unless it&#8217;s needed. If it is needed, a password should be required for elevating privileges, to prevent unauthorized changes to the system.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Consider renaming the administrator account so that it&#8217;s not obvious to an intruder. Since this account can&#8217;t be &#8220;locked out,&#8221; password attacks can be performed indefinitely; changing the name makes the account less of a target.<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>5th commandment: Set passwords<\/strong><\/span><\/p>\n<p>Set the main Windows password, as well as the Power\/Time to lock the system, with a screen saver, and require a password to resume activity.<\/p>\n<p><span style=\"color: #000000;\">Also, depending on the sensitivity of information on your system (did someone say &#8220;online banking&#8221;?), consider password alternatives, such as:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">Smartcard reader (contact or contactless)<\/span><\/li>\n<li><span style=\"color: #000000;\">Biometric facial recognition<\/span><\/li>\n<li><span style=\"color: #000000;\">RSA software and external token<\/span><\/li>\n<li><span style=\"color: #000000;\">Password &#8220;gesture&#8221; (e.g., Android tablets)<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Another option is two-factor authentication, such as requiring both a fingerprint and a password.<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>6th commandment: Add\/activate anti-theft tools<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Invest in, install and activate anti-theft tools that can either lock the system; conduct an IP trace; report, take and send pictures; and even wipe the computer when a lost or stolen computer reconnects to the Internet. An example is Absolute Software&#8217;s\u00a0<span style=\"color: #000000;\">Lojack for Laptops<\/span>.<\/span><\/p>\n<p><span style=\"color: #000000;\">Vendors like Lenovo are embedding Absolute&#8217;s\u00a0<span style=\"color: #000000;\">CompuTrace Agent<\/span>\u00a0into the BIOS, so even if somebody erases or replaces the hard drive, the agent is automatically re-installed.<\/span><\/p>\n<p><span style=\"color: #000000;\">Computers that include\u00a0<span style=\"color: #000000;\">Intel Anti-Theft technology<\/span>\u00a0in their hardware let you add additional security services, such as automatically locking the main board until it receives the &#8220;unlock&#8221; password, lock or wipe if a machine goes too long without connecting to the Internet or if a user fails the login process too many times. Intel Anti-Theft is typically part of third-party security products like CompuTrace, adding perhaps $3\/year, and as the anti-theft option on WinMagic&#8217;s\u00a0<span style=\"color: #000000;\">full disk encryption<\/span>\u00a0product.<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>7th commandment: Turn off sharing and other unneeded services<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Windows allows you to share resources that are on your computer, like file-sharing (Shared Folders) and print sharing. Your computer&#8217;s Internet connection management utility (Windows includes one, but many systems have their own) lets you define each network as either Public, Home or Work. If you mis-set a connection, your Shared Folders will be visible to other computers on the network.<\/span><\/p>\n<p><span style=\"color: #000000;\">Suggested Desktop Security Reading<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\"><span style=\"color: #000000;\">Windows 7: Explore New and Improved Security Features<\/span>\u00a0(Microsoft)<\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"color: #000000;\">Security checklist for Windows 7<\/span>\u00a0(Microsoft)<\/span><\/li>\n<li><span style=\"color: #000000;\">&#8220;<span style=\"color: #000000;\">Enhancing Endpoint Security for Windows Desktops<\/span>,&#8221; Derek Melber, President and CTO of BrainCore.Net<\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"color: #000000;\">Best Practices: Windows Desktop<\/span>, IT Security for the University of Missouri<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">If you are behind a firewall, when your computer&#8217;s Internet connection manager tool asks you what kind of location\/connect it is, you can call it either a Home or Work network, Bott says. But specify Public network if you are connecting directly to the Internet (e.g., at home or in the office), if you don&#8217;t have a hardware router but instead are directly connected to the cable modem, or if you are connecting to a public network like a Wi-Fi hotspot or a hotel or\u00a0<span style=\"color: #000000;\">conference Ethernet<\/span>. This will ensure that no local sharing is allowed.<\/span><\/p>\n<p><span style=\"color: #000000;\">In general, disable any services and remove programs you don&#8217;t need. For example, if you&#8217;re sure your applications won&#8217;t need it, you may want to uninstall Java. If your machine has Internet Information Services (IIS) running but doesn&#8217;t need it, disable that, as well.<\/span><\/p>\n<h4><span style=\"color: #ff6600;\"><strong>8th commandment: Secure your Web browser and other applications<\/strong><\/span><\/h4>\n<p><span style=\"color: #000000;\">Web browsers access Web sites that neither you nor your company control (and these sites, in turn, may have ads or link to other content that they don&#8217;t control). Any of these may try to inject malware onto your computer.<\/span><\/p>\n<p><span style=\"color: #000000;\">[Also read\u00a0<span style=\"color: #000000;\">10 ways to secure browsing in the enterprise<\/span>]<\/span><\/p>\n<p><span style=\"color: #000000;\">Today&#8217;s browsers include more security, like &#8220;private browsing&#8221; session modes that prevent any personal information from being stored, or don&#8217;t save cookies or history for a session. However, this may interfere with productivity.<\/span><\/p>\n<p><span style=\"color: #000000;\">Check each browser&#8217;s security options and select the ones that look useful, like Firefox&#8217;s &#8220;Warn me when sites try to install add-ons&#8221; and &#8220;Block reported attack sites.&#8221;<\/span><\/p>\n<p><span style=\"color: #000000;\">Set Microsoft Internet Explorer to have the highest security setting you can tolerate (since higher security often means you have to click more often), suggests Tom Henderson, Managing Director of ExtremeLabs.com, an Indianapolis, Indiana technology testing lab.<\/span><\/p>\n<p><span style=\"color: #000000;\">Additionally, look for browser &#8220;extensions&#8221; and add-ons that increase your browser&#8217;s security, in a more per-tab, per-site or per-tab-session way. For example, the popular\u00a0<span style=\"color: #000000;\">NoScript<\/span>\u00a0Firefox add-on allows JavaScript, Java, Flash and other plug-ins to be executed only by trusted Web sites of your choice.<\/span><\/p>\n<p><span style=\"color: #000000;\">PDF readers may also be\u00a0<span style=\"color: #000000;\">vulnerable to JavaScript attacks<\/span>\u00a0within the documents they&#8217;re rendering. Make sure your PDF reader is secure; consider disabling JavaScript within it.<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>9th commandment: Rope in Autorun<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">AutoRun is a major threat vector for viruses and other malware in Windows XP and Windows Vista. [Editor&#8217;s note: Simson Garfinkel\u00a0<span style=\"color: #000000;\">called Autorun an &#8220;OS design flaw<\/span>&#8221; all the way back in 2006.] With this function, the operating systems automatically begins executing a program when it sees an autorun.inf file in the root directory of a new drive, such as a network drive, a CD or a flash drive. So, if you haven&#8217;t yet moved to Windows 7, make sure you&#8217;ve got all the security updates for the OS version you are running. (See\u00a0<span style=\"color: #000000;\">MS Security Advisory: Update for Windows Autorun<\/span>.<\/span><\/p>\n<p><span style=\"color: #000000;\">With Windows 7, all the security settings are &#8220;No Autorun.&#8221; When you attach external media like CDs, DVDs, SD cards and USB flash drives, they will give you a dialog box offering to run a program, but by default, nothing happens automatically.<\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"color: #ff6600;\"><strong>10th commandment:<\/strong><\/span> Consider application whitelisting and other controls &#8220;Whitelisting&#8221; refers to a list of everything you allow on your computer, including e-mail addresses your mail program can accept, Web sites your browser is allowed to connect to and applications the operating system is allowed to run. Whitelisting may not be a match for e-mail or Web browsing, but for preventing unwanted applications from running&#8211;such as malware or zero-day attacks&#8211;it may be a good additional tool.<\/span><\/p>\n<p><span style=\"color: #000000;\">Windows 7 includes\u00a0<span style=\"color: #000000;\">AppLocker<\/span>, a whitelisting utility, or you can buy third-party white-listing products for either individual computers or groups of networked computers. For home users, Windows 7 has fairly robust parental controls that can restrict access by time-of-day or by site, and log Web access, Bott says.<\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong>Conclusion: It&#8217;s easy to become more secure<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">As you can see, there is a lot you can do affordably, even to existing Windows systems, to increase their security. It shouldn&#8217;t take a lot of time or money to do; however, it may take a lot of both if you don&#8217;t do anything and something avoidable goes wrong.<\/span><\/p>\n<p>To View Entire Article Click Here<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the introduction of Windows 7, many PC and notebook users may feel more secure than they did using older versions of the Microsoft operating system. Newer OSs have more security features, offer better out-of-the-box security settings and have closed &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/windows-security\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[142,8,103,89,16],"tags":[647,269,1464,522,63,520],"class_list":["post-1629","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-tips-info","category-utilities","category-windows","tag-file-sharing","tag-operating-system","tag-security","tag-security-software","tag-south-jersey-techies","tag-user-accounts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 Commandments of Windows Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/windows-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Commandments of Windows Security\" \/>\n<meta property=\"og:description\" content=\"With the introduction of Windows 7, many PC and notebook users may feel more secure than they did using older versions of the Microsoft operating system. Newer OSs have more security features, offer better out-of-the-box security settings and have closed &hellip;Continue Reading&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/windows-security\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-29T20:10:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-03T16:52:34+00:00\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/southjerseytechies.net\/blog\/windows-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/windows-security\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\"},\"headline\":\"10 Commandments of Windows Security\",\"datePublished\":\"2012-05-29T20:10:32+00:00\",\"dateModified\":\"2025-11-03T16:52:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/windows-security\/\"},\"wordCount\":2037,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"keywords\":[\"File Sharing\",\"Operating System\",\"Security\",\"Security Software\",\"South Jersey Techies\",\"User Accounts\"],\"articleSection\":[\"Security\",\"Software\",\"Tips &amp; Info\",\"Utilities\",\"Windows\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/windows-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/windows-security\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/windows-security\/\",\"name\":\"10 Commandments of Windows Security\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"datePublished\":\"2012-05-29T20:10:32+00:00\",\"dateModified\":\"2025-11-03T16:52:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/windows-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/windows-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/windows-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Commandments of Windows Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Commandments of Windows Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/windows-security\/","og_locale":"en_US","og_type":"article","og_title":"10 Commandments of Windows Security","og_description":"With the introduction of Windows 7, many PC and notebook users may feel more secure than they did using older versions of the Microsoft operating system. Newer OSs have more security features, offer better out-of-the-box security settings and have closed &hellip;Continue Reading&rarr;","og_url":"https:\/\/southjerseytechies.net\/blog\/windows-security\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2012-05-29T20:10:32+00:00","article_modified_time":"2025-11-03T16:52:34+00:00","author":"Website Admin","twitter_card":"summary_large_image","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/southjerseytechies.net\/blog\/windows-security\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/windows-security\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f"},"headline":"10 Commandments of Windows Security","datePublished":"2012-05-29T20:10:32+00:00","dateModified":"2025-11-03T16:52:34+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/windows-security\/"},"wordCount":2037,"commentCount":0,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"keywords":["File Sharing","Operating System","Security","Security Software","South Jersey Techies","User Accounts"],"articleSection":["Security","Software","Tips &amp; Info","Utilities","Windows"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/southjerseytechies.net\/blog\/windows-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/windows-security\/","url":"https:\/\/southjerseytechies.net\/blog\/windows-security\/","name":"10 Commandments of Windows Security","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"datePublished":"2012-05-29T20:10:32+00:00","dateModified":"2025-11-03T16:52:34+00:00","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/windows-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/windows-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/windows-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"10 Commandments of Windows Security"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/support\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-qh","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/1629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=1629"}],"version-history":[{"count":5,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/1629\/revisions"}],"predecessor-version":[{"id":13616,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/1629\/revisions\/13616"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=1629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=1629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=1629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}