6.2 Explain methods to secure devices and best practices.
📘CompTIA ITF+ (FC0-U61)
1. Antivirus / Anti-malware
What it is:
Antivirus or anti-malware software is a program that scans your device for harmful programs (malware), like viruses, ransomware, spyware, or worms.
How it works:
- It checks files and applications before they run.
- If malware is found, it can quarantine (isolate) or remove it.
- Modern anti-malware programs also monitor behavior to catch suspicious activity.
Example in IT:
- A workstation downloads an unknown email attachment. The antivirus detects it as malware and blocks it before it can infect the system.
Best practices:
- Always install antivirus on every device.
- Keep it updated because new malware is created all the time.
- Schedule regular scans to check all files.
2. Host Firewall
What it is:
A host firewall is software (or sometimes hardware) that blocks unauthorized access to a device while allowing safe communication.
How it works:
- Monitors incoming and outgoing network traffic.
- Blocks unknown or suspicious connections.
- Can allow trusted applications or IP addresses to communicate.
Example in IT:
- A server receives a connection request from an unknown IP trying to access sensitive files. The host firewall blocks it.
Best practices:
- Always keep the firewall enabled.
- Configure rules to allow only necessary services (like email or web traffic).
- Combine with antivirus for extra protection.
3. Changing Default Passwords
What it is:
Many devices and software come with default usernames and passwords (like “admin/admin”). These are publicly known and very insecure.
Why it’s important:
- Hackers can easily access devices if default passwords are not changed.
Example in IT:
- A network printer has a default admin password. If it’s not changed, anyone on the network can change its settings or access scanned documents.
Best practices:
- Always change default passwords when setting up new devices.
- Use strong, unique passwords for every device.
4. Enabling Passwords
What it is:
Passwords prevent unauthorized users from accessing devices.
How it works:
- Devices like laptops, phones, or servers require a password to log in.
- Some devices support multi-factor authentication (MFA) for extra security (like a password + code sent to your phone).
Example in IT:
- A shared workstation in an office requires each user to enter a password to log in. Only authorized staff can access files.
Best practices:
- Always require passwords on all devices.
- Avoid simple passwords like “123456” or “password.”
- Use a password manager to safely store complex passwords.
5. Safe Browsing Practices
What it is:
Safe browsing means being careful about what websites you visit and what you click on online.
How it works:
- Avoid suspicious websites or downloads.
- Do not click links in emails unless verified.
- Look for HTTPS in websites to ensure secure connections.
Example in IT:
- An employee receives an email with a link claiming to be a software update. Safe browsing practices would advise verifying the source before clicking to prevent malware infection.
Best practices:
- Always verify links and sources.
- Keep browser and plugins updated.
- Use browser security features or extensions to block malicious content.
6. Patching / Updates
What it is:
Patching means installing updates released by software or device vendors. These updates fix security vulnerabilities and improve performance.
Why it’s important:
- Hackers exploit outdated software to gain access to systems.
- Regular updates reduce the risk of attacks.
Example in IT:
- A workstation runs an outdated version of Windows. A hacker exploits a vulnerability. Installing the latest security patch closes this vulnerability.
Best practices:
- Enable automatic updates where possible.
- Update operating systems, applications, and firmware.
- Test critical systems before major updates to avoid disruptions.
Summary / Exam Tips
- Antivirus/Anti-malware → protects against malicious software.
- Host firewall → blocks unauthorized network access.
- Changing default passwords → prevents easy hacker access.
- Enabling passwords → ensures only authorized users can log in.
- Safe browsing practices → reduces the risk of malware and phishing.
- Patching/Updates → fixes vulnerabilities in software and devices.
💡 Remember for the exam: Security is layered—no single solution is enough. Combine all the above to keep devices safe.
