As exciting as new devices are, it’s easy to get caught up in the fun of using it without considering how you will be using it in a few months. As you purchase your new tech-toy, now is the right time to make yourself aware of the ways that you’ll need to protect your new device and the important information you store on it. Just remember—if it connects to the Internet, it is vulnerable. 

From laptops to smart phones, to connecting safely online, here’s our ultimate guide on how to setup and protect your new tech. 

1. Install Security Software

While a brand-new computer or smartphone out of the box may seem secure, it is not. Sometimes a brand-new device may sit in a stock room for months before finding its new home. One of the very first things you should do is install a trusted Internet security suite, such as Norton Security. An up-to-date Internet security suite will help defend your tech against viruses, spyware, malware and other online threats. 

2. Software Updates

Remember, that shiny new toy has never been turned on until it arrives in your hands and has not had the chance to be updated. Once you have installed your Internet security software, run all operating system updates. This will protect your computer against the latest, known threats on the Internet landscape. 

3. Remove Unnecessary Software or Apps

Many new computers, smartphones and tablets will come bundled with other software, or “add-ons.” Each app or program is essentially a weakness, because it can contain software vulnerabilities. The more apps and software you have installed, the more vulnerable it is. Go through your applications and delete the ones you know you won’t use. 

4. Put a Password on It

Secure password use is essential for all physical devices, as it is the first defence against unauthorized access. Many people make the mistake of using passwords that are too simple. Yes, your pet’s name is a nice password and easy to remember, however it’s also much easier to crack than a term mixed with numbers and symbols in addition to random letters. There is no such thing as a complicated password in today’s digital world! 

5. Beware of Third-Party App Stores

Always verify apps before you install them on your device. There are third-party applications available outside of official app stores. While many of these applications are harmless, others may contain malicious code that could harm you device or information security. It is not recommended to visit these stores, and to only visit and download from official app stores. 

6. Disable Bluetooth Connectivity

Disable Bluetooth connectivity when you’re out in public. Bluetooth allows your device to connect wirelessly with other smart electronics—and enables other people to connect to your device without your permission if it’s left on and unattended. Attackers could be anywhere, from the local coffee shop you frequent, to your favourite restaurant you use around the corner. Leaving your Bluetooth on all the time puts you and your personal information at a huge disadvantage.

7.Use public Wi-Fi securely:

These days we’re using our devices constantly and more so when we are out and about. As a result, caution is needed when connecting your device to unsecured public Wi-Fi. There are many risks that come with connecting to these networks. Consider using a virtual Private Network (VPN) like Norton Secure VPN to help protect your private information and sensitive data by encrypting the data you send and receive when connecting to free public Wi-Fi.

Keep these tips and suggestions in mind as you begin to enjoy your new tech and know your information is safe from threats. Stay up to date on the latest security innovations so you can feel good about the safety of your device. The best way to get ahead of the bad guys is to participate in your own Internet security. Educate yourself about the threats out there and how they can affect you. Use reputable security software on your devices to secure them and tell your friends to do the same! When more of us stay protected together, attackers will have fewer targets to take advantage of.