Operating System and Application Security

Maintaining Core Defences


Published on 27/06/2025

Operating System and Application Security: Maintaining Core Defences

Keeping your device's operating system (OS) and installed applications updated is essential for patching security holes.

  • Enable Automatic Updates for Your Operating System:
    • Windows, macOS, Linux: Configure your OS to download and install security updates automatically. This ensures you receive critical patches as soon as they are available.
    • Reboot When Required: Some updates require a system reboot to take effect. Do this promptly.

  • Keep All Applications Updated:
    • Web Browsers, Office Suites, PDF Readers, Media Players: These are common targets for attackers. Enable automatic updates within these applications or regularly check for and install updates manually.
    • Third-Party Software: Don't forget other software installed on your system. Vulnerabilities can exist in any application.

  • Remove Unnecessary Software and Applications:
    • Reduce Attack Surface: Uninstall any software you no longer use. Fewer applications mean fewer potential vulnerabilities and a smaller attack surface.
    • Bloatware: Remove pre-installed software (bloatware) that you do not need, as it can sometimes pose security risks or consume system resources.

  • Use Standard User Accounts for Daily Tasks:
    • Principle of Least Privilege: Avoid using an administrator account for everyday computing. Operating with standard user privileges limits the potential damage malware can cause if your system is compromised. Only log in as an administrator when necessary to install software or change system settings.

  • Be Cautious with Software Sources:
    • Official Stores and Vendor Websites: Only download software from official app stores (like Microsoft Store, Mac App Store) or directly from the reputable software vendor's website.
    • Avoid Unofficial Download Sites: These sites may bundle legitimate software with malware or adware.

  • Understand and Manage Application Permissions:
    • Review Requests: When installing new software, and periodically for existing software (especially on mobile devices), review the permissions it requests. Grant only those permissions that are necessary for the application's core functionality.
Back