When working with clients on cybersecurity tasks, or addressing security vulnerabilities, they sometimes ask, "how do I find all programs on my computer?" The good news is you don’t need to be an IT professional to see all of the programs on your computer. The bad news is you probably have no idea how many unnecessary programs are currently on your computer. A word of caution before we begin – although this is ‘easy’ work, we don’t recommend uninstalling a program just because you don’t know what it is. What this article will tell you is how to find a list of programs on your machine, and how to evaluate that list to find possibly unnecessary or malicious programs.
Creating a software inventory is an important step in any cybersecurity initiative. For our clients, this is an important piece of complying with various cybersecurity regulations.. Having accurate records helps you stay organized and look good in audits!
Let’s dive into why you should care about software installed on your computer, how to find a list of installed programs, and what to do next.
There are a few reasons you should care about what’s installed on your computer – and this goes for both work and personal machines:
Ok, the reason you’re reading this article, how do you actually find all of the programs on your computer? There are a few ways, depending on your situation:
So you have a list of programs installed on your computer, or maybe you have a list of programs installed on all company assets. Now what?
We typically recommend doing this annually. Review the list of programs and make note of any that seem unusual or unneeded. This is where it gets tricky – how do you know which programs are unusual?
Take a look at your own computer’s programs and see if anything stands out. If you aren’t sure what it is, Google it! Here are some real examples we’ve seen:
A word of caution - as much as we want you to remove unneeded programs, it’s best to check with your IT firm to make sure these programs aren’t needed to support other necessary-for-business programs. But something like Candy Crush? Crush it! Remove it!
If you don’t have the time to make cybersecurity a priority in your business, a Virtual CISO is a smart choice. We’ll start with a 60-point gap assessment and guide you through a project plan to strengthen your company’s cybersecurity posture. We’ll help you figure out the hardware and software inventories, add in monitoring tools, vulnerability scanning and more.
Company-crippling cybersecurity incidents happen every day, but luckily great cybersecurity help from us won’t break the bank. https://adeliarisk.com/virtual-ciso-service/