LET’S TALK ABOUT COMPUTER PROTECTION



LET’S TALK ABOUT COMPUTER PROTECTION 
HOW CAN YOU BE AWARE FROM HACKERS, SPYWARE, VIRUSES & OTHERS



This is by no means a comprehensive list, so if you have any suggestions, please feel free to comment and i’ll add them on!




STEPS TO AVOID VIRUSES & MALWARE




1. ANTI-VIRUS

Here are some popular AV’s FREE AND PAID:


Avira – www.avira.com
Bitdefender – www.bitdefender.com
AVG – www.avg.com
Kaspersky – www.kaspersky.com

NOD32 - www.eset.com
Symantec / Norton AV - www.symantec.com



In addition to anti-virus software, you should install one anti-malware program and the best is malwarebytes Anti-Malware Free (https://www.malwarebytes.com/mwb-download/).




2. UPDATE ALL!

Installing an anti-virus program by itself is not enough. There are hundreds of new threats that are found daily and the anti-virus programs release updates regularly to combat these new threats. Make sure your anti-virus program is set to update automatically so that you don’t have to rely on your memory to do it. Also, this goes for all the software on your computer. The most important software to keep up to date is your Windows operating system. It is essential to have Automatic Updates turned on and set to download and install updates automatically.




3. TRUSTED SOFTWARE

If you’re not sure what a piece of software does from its name, then don’t install it. Also, don’t install anything you didn’t intend to install in the first place. Sometimes programs will ask you to install other programs during the install of the original application. Be careful of that because it’s usually spyware. If you’re installing software from big names sites like Microsoft or Adobe, you’re good.




4. P2P / FILE SHARING / DOWNLOADS

If used with great caution, P2P software is quite useful for movies, songs and software, but if you’re not very technically savvy, you might end up downloading a song that has a keystroke logger attached to it that will send anything you type to some other computer over the Internet. It’s almost impossible to tell that this is occurring unless your anti-virus or anti-spyware programs pick it up in their scans. If you don’t know what you’re doing, don’t try to download or torrent.





5. DELETE UNKNOWN EMAILS

If you receive emails from random people, do not bother to open the email, just delete it. If you have any doubts after reading the name and the subject, it’s probably not someone you know. Never download or open attachments unless you are sure it’s from someone you know. Give the person a call quickly and ask them if you’re not sure. Most large companies that you create online accounts with will not send you attachments unless you specifically ask for them through their web site. Also, be wary of any emails from sites pretending to be banks, auction sites, etc. Asking for you to verify bank account info or address info. No bank ever does that.



Also, hackers try to prey on your emotions. If something sounds too good to be true, i.e. You won some money or free vacation, it probably is. Secondly, if you get any email from the IRS or police or a lawyer or anyone else trying to scare you, don’t panic and start giving out information. These are all usually scams because no official agency emails people about serious issues.




6. DO NOT CLICK ON ADS

Avoid clicking on ads if you can. Especially those ads where something is flying around and if you shoot the duck, you win some prize! Ads have become more sophisticated in that they try to make the ad interactive so that you’ll be tempted to play it like a game.




7. RUN VIRUS SCANS REGULARLY

If you’re not in the mood to scan every day, at least run a scan once a week. Actually, setup a schedule for your computer in your anti-virus software to run a scan late at night or whenever you don’t use your computer and that way you won’t be bothered with a slow computer.




8. BE CAREFUL WHAT YOU ATTACH TO YOUR COMPUTER

This is a more common way to transfer viruses than you might think. Everyone now has a USB flash stick that they carry around on their key chains, ready to snap into any computer. But who knows what viruses are on your friends’ computers and what accidentally got transferred to their USB stick. A lot of virus programs will auto launch right when the USB stick is put into the computer, so you don’t even have to open or download any of the files to be infected.




9. AVOID SHADY WEB SITES

If you need to look at porn, then make sure you do it in a virtual environment. You are DEFINITELY going to get a virus or spyware if you browse porn sites on your computer. Virtualization basically allows you to run programs like Internet Explorer in a virtual environment that does not affect your current operating system. If you want to find out more, search for “Virtual PC” or “vmware” in Google. Otherwise, simply avoid going to shady web sites! Also, check out my articles on Hyper-V and vmware Fusion.




10. TURN ON OR INSTALL A FIREWALL

If you’re running Windows or Mac, make sure firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public. Also, when buying a wireless router, make sure it has a built in firewall. Having a software and hardware firewall is better than just having one or the other.




11. SECURE YOUR WIRELESS NETWORK

Most wireless routers are set to no security when you install them. Be sure to log into the router and at least set the basic security that requires a password. There are stronger encryption options, but if you don’t understand those, then simply set a password on the router and the wireless network, otherwise anyone can connect to your home network and change all the settings.




12. USE A COMPLEX PASSWORD FOR LOGIN

This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it’s complex. Complex means it should have numbers, upper case characters, lower case characters, and symbols. This makes it way more difficult for a hacker to get into your computer.




13. USE TWO FACTOR AUTHENTICATION

Many online services now allow you to enable two factor authentication, which means you’ll need to type in a code in addition to your password when logging in. This makes your account much more secure, even though it adds a bit on inconvenience. You should enable it on all the major services like Facebook, Google, Apple, Microsoft, etc. Check out my article on setting up two factor authentication and properly configuring it.




14. USE ENCRYPTION WHEN POSSIBLE

Even if someone is able to steal your data or monitor your Internet connection, encryption could help prevent the hacker from being able to read any of that information. You can encrypt your Windows or OS X hard drive, encrypt a USB flash drive, and even encrypt all your web traffic using a VPN.




If you follow all the steps above, you can rest assured that you will be able to avoid 99% of the Internet threats that are out there. It’s really a matter of being disciplined and careful rather than being completely carefree when using your computer.

 DID YOU LIKE THIS ARTICLE? Let me know your comments and thoughts.

Comments

Popular posts from this blog

REASONS TO REPLACE YOUR COMPUTER FAN AND HEATSINK

LET’S TALK ABOUT PC AUDIO SPEAKERS

LET’S TALK ABOUT - NETWORK FORENSICS