The first action that can be taken is to encrypt data. This involves converting data to some form of code to prevent it from being accessed without authorization. The new data form is called cipher-text. Encryption can be achieved by purchasing encryption software.
The second action is the use of up to date antivirus software. This prevents unauthorized access to your system. An out dated antivirus opens up the system to hackers.