Close Menu
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    KahawatunguKahawatungu
    Button
    • NEWS
    • BUSINESS
    • KNOW YOUR CELEBRITY
    • POLITICS
    • TECHNOLOGY
    • SPORTS
    • HOW-TO
    • WORLD NEWS
    KahawatunguKahawatungu
    TECHNOLOGY

    How to Secure your Device’s Operating System

    Francis MuliBy Francis MuliNovember 2, 2020No Comments2 Mins Read
    Facebook Twitter WhatsApp Telegram Email
    Share
    Facebook Twitter WhatsApp Telegram Pinterest Email Copy Link

    This week’s bulletin on CyberSecurity by the National Computer Incident Response Team (CIRT) highlights how to keep your Operating system (OS) safe.

    The OS is the most important software that runs on your phone or computer. It manages your device’s processes, software, hardware and also the memory of the device. Examples of common operating system are: Windows, Linux, Ubuntu, MacOS and ChromeOS. For the phone, common OSs are Android and iOS.

    Read: How To Use Google Meet

    Common OS Attacks

    • Remote Code Execution (RCE): This happens when cybercriminals run a random malicious code on your device. By doing so, the attacker can gain full control of the entire network for your device or even an entire corporate system. They can also tamper with privileges and access codes and exploit other permissions to their advantage.
    • Denial of Service (DoS): This happens when cybercriminals make services to your devices unavailable. In most cases, they disrupt the services of the users connected to the internet temporarily or indefinitely.
    • Information disclosure: This happens when cybercriminals obtain users personal data. They do so by exploiting the existing OS Software bugs to access the device’s memory and steal information.

    Read also: What Is OnlyFans And How Does It Work?

    How to Secure your OS

    • Make a point of updating your software as it is always enhanced with critical security patches. Your OS always gives you notifications of the latest updates with a prompt to get started.
    • Shut down or delete apps and services that have access to your network and are not in use. Cyber criminals can use some of these idle apps to execute their schemes.
    • Ensure that any sensitive information and communication is encrypted
    • Keep an encrypted back up of your data.
    • Use strong passwords that cannot be guessed easily using brute force attacks. Avoid birthdays, children’s names and such as they are common. Also, make a point of changing your password periodically
    • Ensure that you have a good anti virus software that monitors your device or system for any security threats and breaches.

    Email your news TIPS to Editor@kahawatungu.com or WhatsApp +254707482874. You can also find us on Telegram through www.t.me/kahawatungu

    Email your news TIPS to Editor@Kahawatungu.com — this is our only official communication channel

    ChromeOS Linux MacOS Operating System (OS) Ubuntu Windows
    Follow on Facebook Follow on X (Twitter)
    Share. Facebook Twitter WhatsApp LinkedIn Telegram Email
    Francis Muli
    • Website
    • Facebook
    • X (Twitter)
    • Instagram
    • LinkedIn

    Follow me on Twitter @francismuli_ Email: Editor@Kahawatungu.com

    Related Posts

    Israel Issues Travel Advisory for Tanzania Ahead of Expected December 9 Demonstrations

    December 5, 2025

    Ndanyi named new Rift Valley police commander in changes

    December 4, 2025

    Meta starts kicking Australian children off Instagram and Facebook 

    December 4, 2025

    Comments are closed.

    Latest Posts

    DCI Arrests Three Over Sh350 Million Fraudulent Transfer of NSSF Land

    December 5, 2025

    Police Arrest Nine Suspected Gang Members in Kakamega

    December 5, 2025

    Israel Issues Travel Advisory for Tanzania Ahead of Expected December 9 Demonstrations

    December 5, 2025

    Parliament Vetts SRC CEO Nominee Ali Abdullahi Surraw

    December 5, 2025

    Cary-Hiroyuki Tagawa, actor who performed in ‘Mortal Kombat,’ dies at 75

    December 5, 2025

    Monique Lamoureux-Morando Siblings: Meet the Siblings Squad Behind the Ice Hockey Icon

    December 5, 2025

    Matthew Tkachuk Siblings: All About Brady and Taryn Tkachuk

    December 5, 2025

    10 Women Legislators Graduate from Parliamentary Gender Equality Programme

    December 5, 2025
    Facebook X (Twitter) Instagram Pinterest
    © 2025 Kahawatungu.com. Designed by Okii.

    Type above and press Enter to search. Press Esc to cancel.