Sub Total
Excluding delivery and voucher code discounts.
Go to basket

Free Delivery on all orders to UK mainland within 3 working days.


Exploring today's technology for tomorrow's possibilities
Computer Security Tips - How to Protect your PC

Computer Security Tips: How to Protect your PC

Arthur Smalley
Unfortunately for the rest of us, there has never been a better time to be a cybercriminal. Computer security must become part of our daily routines. Over the last 30 years, society has shifted to digital solutions, and we now run much of our lives through websites and online applications. The Covid-19 pandemic rapidly accelerated this process
Without the possibility of face-to-face interactions, companies and consumers had to quickly transition and learn how to operate online. Unfortunately, this increased the opportunity for would-be hackers looking to exploit users' sensitive information.
Many of these newer online users tend to be less tech-savvy, previously only utilising in-person or postal services. Unfortunately, newer users are ideal targets for cybercriminals, often making mistakes online that compromise computer security and privacy.

UK cybercrime statistics

The rapid digital acceleration over recent years has brought with it a surge in cybercrime. Data from 2021 shows the UK has the highest cybercrime rate in the world, with 4,783 victims per million people. That represents almost a 0.5% chance of becoming a victim. Or put another way, nearly 1 in 200 people in the UK were victims of cybercrime in 2021.
This is the second year in a row that the UK is top in cybercrime density (victims per million people), and the 2021 figure is a whopping 40% larger than 2020. The UK rate is also almost three times greater than the US in second place, with 1,494 victims per million people.
Given the growing likelihood of online crimes, computer security is more important now than ever before. However, the overwhelming majority of cybercriminals are looking for low-hanging fruit. They're targeting people with poor PC security habits to maximise their impact while minimising their efforts.
Therefore, following a relatively short list of computer security and privacy tips can go a very long way toward protecting yourself online.

Today's top computer security threats

Today's top computer security threats
Before we go into tips for PC security, let's first look at the types of threats we are all exposed to by just being online.


Malware refers to malicious software designed to infiltrate computers or networks of computers, causing harm and exploiting them for the hacker's gain. Malware is a catch-all term that covers many types of cyber attacks, including:
  • Viruses
  • Worms
  • Spyware
  • Adware
  • Ransomware
  • Trojan viruses
The malware allows unauthorised users to access and extract private data to be leveraged for profit. This data could be financial information, healthcare records, or login information (i.e., passwords/usernames) to access other more valuable accounts, such as an employer's network.
Malware can infiltrate the security of computers using multiple delivery mechanisms, the most common of which is phishing.


Phishing emails are something most of us will have experienced. They appear to be from a trusted sender (e.g., company, friend, colleague, government authority, etc.) and direct the recipient to click a link or download an attachment.
However, these emails are fake, sent by bad actors to trick victims into downloading malware onto their computers or offering up their login information. This could be an attached file or a link to a fake or compromised website where any sensitive information entered is retrieved by the cybercriminal.
Generally, phishing is part of a wider attack. It acts as the delivery mechanism, getting around computer security systems the next stage of the attack occurs.

Social engineering attacks

While the most common, phishing is one of many when it comes to social engineering attacks. Social engineering refers to cyberattacks that use manipulation and deception instead of technical computing knowledge or so-called "hacking."
Generally, it is much easier to fool people into disclosing their personal information than it is to break down the security of computers. Other than phishing, social engineering attacks include:
  • Spear phishing – A more advanced form of phishing where the attacker takes greater care to produce more authentic-looking correspondence. Think of phishing as spamming low-effort emails to reach as many people as possible. Spear phishing is a more targeted strategy, selecting similar individuals and producing tailored messages to increase the chances of them being deceived.
  • Scareware – Using fear to trick people into acting quickly and downloading new software (that is actually malware) on their computer. Scareware typically uses emails or online pop-ups to inform a user their computer is infected with malware, and that they need to install software to remove it. In fact, the original message is fake, and the software they install is the actual malware.
  • Baiting – Setting up traps that exploit users' curiosity or their eye for value. This could be online advertising for a great new deal or a real-world approach. Bad actors have started leaving physical media, such as USB sticks, in popular locations. People finding these USB sticks lying around end up plugging them into their computers to see what is on them. Perhaps to find information that can return it to the original owner. However, the USB stick contains malware that infiltrates their computer once plugged in.

Other threats

Other computer security and privacy threats to be aware of include:
  • Ransomware – Once a computer system is infiltrated, the attacker encrypts critical files, preventing access and holding them ransom until a fee is paid. While ransomware more commonly goes after businesses, it can also target computers and laptops for personal use.
  • Third-party exposure – Any legitimate software used on your computer may have potential vulnerabilities that sophisticated cybercriminals can exploit.
  • IoT – Connecting new devices to the internet for remote use has led to many new vulnerabilities for bad actors to target.
  • Stalkerware – Monitoring software used to spy on or stalk someone. Stalkerware is often implemented by partners, friends, or family who are close to the victim and can access their personal devices to install discrete stalkerware.
  • Weak Passwords – Often, the biggest threat to your computer is using common or weak passwords that hackers can easily crack.

Top 5 computer security tips

So how can you go about maintaining security systems for laptops and computers? Here are five computer security and privacy tips to help you keep your data safe.

1. Use a password manager

Computer password manager
Once hackers access your login information for a specific online account, the next logical step is to try them on other websites. While frustrating, someone having access to your social media account doesn't automatically mean they can start extracting value from you.
But if those same login details give them access to your banking accounts or e-commerce websites (e.g., Amazon, etc.), they can quickly access funds or spend your money.
The best approach to password computer security and privacy is to have separate logins for each account. However, this is often impractical given how many we all have nowadays. So the real solution is to use a password manager.
Password managers apps allow you to automatically create unique, strong passwords for every account you have. Typically, users add a plugin for their browser or an app on their phone, allowing the password manager to provide the login information from a stored list quickly.
The only password you need to remember is a single, strong password that unlocks the password manager.

2. Two-factor authentication

Two-factor authentication
Another great way to secure your online accounts is using two-factor authentication (2-FA). While this can slow you down a bit when logging in online, it lets you know when anyone is trying to gain access to an online account.
Also, 2-FA adds another layer of authentication to your accounts beyond just a password. This could be some form of biometrics (e.g., fingerprint, facial recognition) or a notification/code sent to your phone when using your laptop or PC.
Especially for your most important accounts (e.g., banking, Google, Apple, Dropbox, etc.), 2-FA is critical to ensuring only you get access.

3. Security software

Security Software
While good practices and user behaviour helps, ultimately, you will also need software on your side to protect your PC security. Many security systems for computers are available that do a great job of keeping bad actors out.
These packages include antivirus software that protects a computer from internal attacks and firewalls that scan online traffic as you browse the web.

4. Keep all software up-to-date

Keep all software up-to-date
One of the most important factors to consider for computer security and privacy is keeping all software up to date. Hackers are constantly testing software to see if they are exploitable, finding tiny mistakes in the code that allow them to circumvent protections or trick the software into offering up the information it shouldn't.
When a vulnerability is found, a manufacturer can update the software and protect their customers. Therefore, software updates can be the quick fix needed to protect your PC security before online attackers can make the most of a new vulnerability.

5. VPNs

Finally, VPNs are a great way of protecting your devices when connecting to public WiFi networks. VPN stands for Virtual Private Network, and while it can slow down your internet connection, it also encrypts your internet traffic and hides your IP address by routing it through a separate server.
When you sit down at a coffee shop or log into public transport WiFi, you have no idea how secure that connection truly is. Unfortunately, cybercriminals often exploit WiFi networks to infiltrate unsuspecting users. VPNs are critical to prevent this and maintain your computer security and privacy.


With growing cybercrime rates, the security of computers is more important now than ever before. While the threat is genuine, by following good PC security practices, you can ensure the security systems for your computer are strong enough to keep yourself protected.
About the Author: Arthur Smalley is a science and technology writer based in the UK.

Disclosure: Our site may get a share of revenue from the sale of the products featured on this page.


Prices, specifications, availability and terms of offers may change without notice. Price protection, price matching or price guarantees do not apply to Intra-day, Daily Deals or limited-time promotions. Quantity limits may apply to orders, including orders for discounted and promotional items. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Correct prices and promotions are validated at the time your order is placed. These terms apply only to products sold by; reseller offers may vary. Items sold by are not for immediate resale. Orders that do not comply with terms, conditions, and limitations may be cancelled. Contract and volume customers not eligible.

HP’s MSRP is subject to discount. HP’s MSRP price is shown as either a stand-alone price or as a strike-through price with a discounted or promotional price also listed. Discounted or promotional pricing is indicated by the presence of an additional higher MSRP strike-through price

The following applies to HP systems with Intel 6th Gen and other future-generation processors on systems shipping with Windows 7, Windows 8, Windows 8.1 or Windows 10 Pro systems downgraded to Windows 7 Professional, Windows 8 Pro, or Windows 8.1: This version of Windows running with the processor or chipsets used in this system has limited support from Microsoft. For more information about Microsoft’s support, please see Microsoft’s Support Lifecycle FAQ at

Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

In-home warranty is available only on select customizable HP desktop PCs. Need for in-home service is determined by HP support representative. Customer may be required to run system self-test programs or correct reported faults by following advice given over phone. On-site services provided only if issue can't be corrected remotely. Service not available holidays and weekends.

HP will transfer your name and address information, IP address, products ordered and associated costs and other personal information related to processing your application to Bill Me Later®. Bill Me Later will use that data under its privacy policy.

Microsoft Windows 10: Not all features are available in all editions or versions of Windows 10. Systems may require upgraded and/or separately purchased hardware, drivers, software or BIOS update to take full advantage of Windows 10 functionality. Windows 10 is automatically updated, which is always enabled. ISP fees may apply and additional requirements may apply over time for updates. See

“Best All In One Printer” and “the easiest printer you’ve ever had to set up” from Wirecutter. ©2020 The Wirecutter, Inc.. All rights reserved. Used under license.

Get Marvel’s Avengers when you purchase HP gaming PCs with qualifying 9th gen or 10th gen Intel® Core™ i5, i7 and i9 processors. Redemption code will be sent out by email within 60 days of purchase. Limited quantities and while supply lasts. Offer valid thru 12/31/2020 only while supplies last. We reserve the right to replace titles in the offer for ones of equal or greater value. Certain titles may not be available to all consumers because of age restrictions. The Offer may be changed, cancelled, or suspended at any time, for any reason, without notice, at Intel’s reasonable discretion if its fairness or integrity affected whether due to human or technical error. The Offer sponsor is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95054, USA. To participate you must create an Intel Digital Hub Account, purchase a qualifying product during the redemption period, enter a valid Master Key, and respond to a brief survey. Information you submit is collected, stored, processed, and used on servers in the USA. For more information on offer details, eligibility, restrictions, and our privacy policy, visit

© 2020 MARVEL. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

The personal information you provide will be used according to the HP Privacy Statement (