Keeping your family safe online is no small thing --  but it takes a series of small steps to reach that big goal.

I wish there was a single program to install, or just one big thing to know, that would keep you safe. But computer safety comes from a soup made up of a bunch of ingredients that, when combined, provides a healthy dose of security.

This soup is brewed from both software and common sense.

So let's get cooking.

I'll get the easy part out of the way first. That's making sure you have secure passwords, a working firewall and programs that help safeguard you from viruses and malware commonly used to invade your computer.

Passwords

Most people create a single password -- and often it's not a good one -- and use it to log on to banking sites, e-mail accounts and sites such as Facebook. If a hacker breaches security at any of those Web sites you've handed him an easy way to clear out your checking account.

Not only should you use a different password for each site, you should also change that password at least three times a year. The password itself needs to be made up of random letters and numbers -- not words. There's much more to it than I have space for here, but the information is too important for a few sentences. So follow this link -- http://tinyurl.com/4fd4t to learn in detail how to craft an effective password.

Firewalls

Long before there were computers, there were firewalls. In a building, a firewall keeps fire from easily invading a space. Firewalls work the same way in the computer world -- forming a barrier that makes it difficult for someone to invade your computer.

The firewall that comes with Windows is just fine. So make sure it is on. You can check that by typing the word firewall into the Windows Help section search box and following the directions for turning it on. Now, test your work by logging onto this website: http://www.auditmypc.com/ and selecting the link called Firewall Test.

Routers -- the gadgets that let your home computers talk to each other and share a single Internet connection -- also create a firewall of sorts. Make sure you read the manual that came with your router and enable the toughest security possible. There are extra steps to take with wireless routers. Here's a website that offers some excellent advice on easing the extra risks a wireless router creates: http://tinyurl.com/nc9uxo

Protecting against viruses and other malware

Many breaches come from purpose-built malware (viruses, worms, adware or spyware). Much of the malware out there today is created to break into your computer, turn it into a remote spamming device or capture your personal information. I use an all-purpose commercial program called Norton 360. But there are free programs that also can do the job. Check out this site to read reviews and download one of the free anti-virus programs: http://tinyurl.com/27lndwn . When it comes to a free program to detect and eliminate spyware and adware, I've been impressed by this one lately: http://www.superantispyware.com/

That gets the easy stuff is out of the way. Now comes the hard part -- using your brain and common sense.

Social networking sites

If you follow the news, you know Facebook and its imitators have had serious security problems. To their credit, most are working hard to close those breaches. You also need to do your part. Here's a website that offers some advice: http://tinyurl.com/29uaavt

Be especially cautious, whether it's on a networking site or a personal website, about posting photos of your family. What seems like a cute photo to you may serve as a lure for some perverted bum. You may think you are anonymous on the Internet, but don't depend on it. Google and other search tools make it relatively easy to take a few clues and find a person's name and address.

Photos

Speaking of photos, you need to know that technology has created new problems. Some cameras and smart phones embed information in the photo that precisely marks the location where the picture was taken. When that's the case, a photo taken in your yard can pinpoint your exact address. Some photo-sharing websites and networking sites remove this information; others don't. Cameras and phones that use this technology can be set to remove the location information. Here's a news story that goes into detail about this relatively new security risk: http://tinyurl.com/2az536e

Computer repair

Another recent news story was about a repairman who found what he believed to be child pornography on a computer he was repairing. He called the cops. If the repairman was correct, then good for him. But let it be a reminder that when your computer goes to the shop, the information on it -- financial and personal -- can be viewed easily. If you have information that puts you or your finances at risk, some shops will allow you to send in the computer without the hard disk. It's usually easy for these shops to pop in a replacement disk and do their work.

File-sharing sites

Some of these sites are illegal, others are sort of shady, and some are legitimate. But even the best of them can harbor software that can invade your computer. My suggestion is to avoid all of these sites.

We've covered a lot of ground today and to do that I've guided you to even more reading on websites. But securing your computer is worth the effort. When you get right down to it, this isn't about protecting your computer, it's about protecting your finances and your family.

About the Author

Keep Reading

Cool off with ice cream, enjoy live music and more at the 15th annual Atlanta Ice Cream Festival on Saturday in Piedmont Park.

Credit: Photo courtesy of Atlanta Ice Cream Festival

Featured

Photo illustration: Philip Robibero / AJC

Credit: Philip Robibero / AJC