Securing devices (mobile/workstation)

6.2 Explain methods to secure devices and best practices.

📘CompTIA ITF+ (FC0-U61)


1. Antivirus / Anti-malware

What it is:
Antivirus or anti-malware software is a program that scans your device for harmful programs (malware), like viruses, ransomware, spyware, or worms.

How it works:

  • It checks files and applications before they run.
  • If malware is found, it can quarantine (isolate) or remove it.
  • Modern anti-malware programs also monitor behavior to catch suspicious activity.

Example in IT:

  • A workstation downloads an unknown email attachment. The antivirus detects it as malware and blocks it before it can infect the system.

Best practices:

  • Always install antivirus on every device.
  • Keep it updated because new malware is created all the time.
  • Schedule regular scans to check all files.

2. Host Firewall

What it is:
A host firewall is software (or sometimes hardware) that blocks unauthorized access to a device while allowing safe communication.

How it works:

  • Monitors incoming and outgoing network traffic.
  • Blocks unknown or suspicious connections.
  • Can allow trusted applications or IP addresses to communicate.

Example in IT:

  • A server receives a connection request from an unknown IP trying to access sensitive files. The host firewall blocks it.

Best practices:

  • Always keep the firewall enabled.
  • Configure rules to allow only necessary services (like email or web traffic).
  • Combine with antivirus for extra protection.

3. Changing Default Passwords

What it is:
Many devices and software come with default usernames and passwords (like “admin/admin”). These are publicly known and very insecure.

Why it’s important:

  • Hackers can easily access devices if default passwords are not changed.

Example in IT:

  • A network printer has a default admin password. If it’s not changed, anyone on the network can change its settings or access scanned documents.

Best practices:

  • Always change default passwords when setting up new devices.
  • Use strong, unique passwords for every device.

4. Enabling Passwords

What it is:
Passwords prevent unauthorized users from accessing devices.

How it works:

  • Devices like laptops, phones, or servers require a password to log in.
  • Some devices support multi-factor authentication (MFA) for extra security (like a password + code sent to your phone).

Example in IT:

  • A shared workstation in an office requires each user to enter a password to log in. Only authorized staff can access files.

Best practices:

  • Always require passwords on all devices.
  • Avoid simple passwords like “123456” or “password.”
  • Use a password manager to safely store complex passwords.

5. Safe Browsing Practices

What it is:
Safe browsing means being careful about what websites you visit and what you click on online.

How it works:

  • Avoid suspicious websites or downloads.
  • Do not click links in emails unless verified.
  • Look for HTTPS in websites to ensure secure connections.

Example in IT:

  • An employee receives an email with a link claiming to be a software update. Safe browsing practices would advise verifying the source before clicking to prevent malware infection.

Best practices:

  • Always verify links and sources.
  • Keep browser and plugins updated.
  • Use browser security features or extensions to block malicious content.

6. Patching / Updates

What it is:
Patching means installing updates released by software or device vendors. These updates fix security vulnerabilities and improve performance.

Why it’s important:

  • Hackers exploit outdated software to gain access to systems.
  • Regular updates reduce the risk of attacks.

Example in IT:

  • A workstation runs an outdated version of Windows. A hacker exploits a vulnerability. Installing the latest security patch closes this vulnerability.

Best practices:

  • Enable automatic updates where possible.
  • Update operating systems, applications, and firmware.
  • Test critical systems before major updates to avoid disruptions.

Summary / Exam Tips

  1. Antivirus/Anti-malware → protects against malicious software.
  2. Host firewall → blocks unauthorized network access.
  3. Changing default passwords → prevents easy hacker access.
  4. Enabling passwords → ensures only authorized users can log in.
  5. Safe browsing practices → reduces the risk of malware and phishing.
  6. Patching/Updates → fixes vulnerabilities in software and devices.

💡 Remember for the exam: Security is layered—no single solution is enough. Combine all the above to keep devices safe.

Buy Me a Coffee