Connect with us

Hi, what are you looking for?

New Products

Five Steps to Improving Windows Vista PC Security

With Unprecedented Sales Predicted for Microsoft Vista PCs this Holiday Season, Windows Security Expert Provides Key Tips for Home Users

With a strong increase in PC sales predicted for the holiday season, many consumers will be encountering Microsoft’s Windows Vista operating system, which first shipped in January 2007, for the first time. To provide these consumers with guidance on the simple, yet crucial ways they can ensure they are protected against threats to their new PC’s security, BeyondTrust, a leading provider of enterprise security software for Windows, has created a list of five key steps new Vista users should take:

1. Do not log into Windows Vista as an administrator.

This is a critical step home users must take when they first start their new computers to protect their family from malware. Malicious software cannot install and users won’t be able to install programs that might be unsavory.

2. Use separate accounts for all family members.

Using separate, non-administrator accounts for multiple users ensures that each person’s data is better protected. Try to avoid giving family members the password for the administrator account. This will prevent them from installing whatever they choose, from who knows where that does who knows what.

3. Vista introduces a new security feature called User Account Control (UAC). Keep it turned on, even if you find it annoying.

A prominent new feature in Vista, UAC prompts users to enter a password whenever they encounter tasks that require full administrator privileges, such as installing software or running certain applications. Because most viruses and other malicious software require administrative rights to install and run, UAC will make it possible for you to view and stop them before they can harm your computer.

4. Set each family member’s e-mail to read incoming e-mails as plain text only, not HTML.

While HTML may make for more desirable display capabilities for viewing e-mail, its benefits are far outweighed by its potential for security compromise. HTML is often used to carry out attacks on your computer, and you should avoid using it.

5. Be sure to log off of the computer when you are finished with your session.

Advertisement. Scroll to continue reading.

This one step is simple but important. You want to keep your data protected and make sure that other users in the household don’t have access to a privileged account.

Source: BeyondTrust CEO John Moyer

About BeyondTrust
BeyondTrust Corporation, a pioneer in Least Privilege Management, enables enterprises to move beyond the need to trust users with excess privileges or administrator passwords. BeyondTrust Privilege Manager was the first product to enable the security best practice of Least Privilege in Windows environments by allowing administrators to assign end-users permissions for required or selected applications. Least Privilege strengthens security by limiting users to the permissions they need to do their jobs. Hundreds of organizations worldwide in industries such as financial, healthcare, government and military rely on BeyondTrust Privilege Manager to secure their enterprises. BeyondTrust is a Microsoft Gold Partner. For more information, visit

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


You May Also Like


ecoustics is a hi-fi and music magazine offering product reviews, podcasts, news and advice for aspiring audiophiles, home theater enthusiasts and headphone hipsters. Read more

Copyright © 1999-2024 ecoustics | Disclaimer: We may earn a commission when you buy through links on our site.

SVS Bluesound PSB Speakers NAD Cambridge Audio Q Acoustics Denon Marantz Focal Naim Audio RSL Speakers