How to Protect Yourself from Viruses, Hackers, and Thieves

ByErma F. Brown

Apr 20, 2022 #3rd Wave Of Technology, #Active Mind Technology Steve Suda, #Adia Technology Limited, #Anxiety Caused By Technology, #Aum Technology Job Openings, #Best Books On Licensing Technology, #Best Us Companies Drivetrain Technology, #Boulder Creek Ca Technology Companies, #Bounce Box Technology, #Bridgerland Applied Technology College Cafeteria, #Cisco Technology News, #Comcast Comcast Technology Internship Program, #Complete Automated Technology, #Defence Technology News, #Definition Information Technology System, #Digital Technology, #Digital Technology Pdf, #Director, #Dxc Technology Malaysia Sdn Bhd, #Emerging Technology In Healthcare 2019, #Energy Efficient Home Technology, #Environmental Technology 2019, #Esl Information Technology Vocabulary, #Farming Technology Replacing People, #I.T. Information Technology, #Information Technology Residency Programs, #Issue With Holographic Counterfeiting Technology, #La Crosse Technology 9625 Manual, #La Crosse Technology C89201 Manual, #Lane Dedection Technology, #Long Quotes About Technology, #Micron Technology San Francisco, #Modern Steel Mill Technology, #Nc Lateral Entry Technology, #New Technology Replaces Wifi, #Russian Technology City, #Shenzhen Nearbyexpress Technology Development, #Stackoverflow Resume With Technology Interests, #State Agency For Technology, #Teacher Comfort With Technology Survey, #Technology Companies In Southwest Florida, #Technology Credit Union Address, #Technology In Mercedes Glc, #Technology Material Grant For College, #Technology Meibomian Lid, #Technology Production And Cost, #Treehouse Education Technology, #Western Technology Center Sayre Ok, #What Is Jet Intellagence Technology, #Why Women In Technology, #Will Technology Take Away Libraries


Locked up image

People often think of computer security as something technical and complicated. And when you get into the nitty-gritty, it can be — but the most important stuff is actually very simple. Here are the basic, important things you should do to make yourself safer online.

Don’t Delay Automatic Updates

All the software applications we use every day are likely riddled with security issues. These security issues are constantly being found — whether we’re talking about Windows, Microsoft Edge, Mozilla Firefox, Google Chrome, Adobe’s PDF Reader, Microsoft Office — the list goes on and on.

These days, a lot of operating systems and programs come with automatic updates to close these security holes. No longer do you need to click a button or download a file to update your software; it’ll update itself in the background without any input from you.

Some people like to turn this off for one reason or another. Others will delay it for weeks. Maybe you don’t like that Windows restarts after installing an update, or maybe you just don’t like change. But from a security perspective, you should always leave automatic updates on.

RELATED: How to Keep Your Windows PC and Apps Up to Date

If you have turned off automatic updates previously, for any of your software, go turn them on right now, and then come back to this. Good job.

Resume your auto updates if you have them off.

RELATED: Why You Need To Install Windows Updates Automatically

Keeping your computer up-to-date is the number one way to keep it safe against online threats. Microsoft provides updates for Windows and associated Microsoft products (Defender, Office) on the second Tuesday of each month. Apple doesn’t have a regimented schedule, but they also regularly provide updates. These updates not only fix bugs, but they patch security holes. So the only way to protect yourself against the latest known vulnerabilities is by updating. Malicious attackers are always looking for unpatched systems they can attack, and automatic updates keeps you off the list of low hanging fruit.

Use Antivirus and Anti-Malware

It seems like every couple of years an article will come out saying one antivirus is the absolute best. Three more will follow saying three others outperformed the first. On top of these, some security expert will write an article saying antivirus is no longer relevant and you’re dumb if you use it.

RELATED: Do I Really Need Antivirus If I Browse Carefully and Use Common Sense?

Let’s set the record straight: you should be running antivirus, even if you’re careful on the web. Which one? It’s up to you — though when it comes to free, simple, and good, there’s nothing wrong with using Microsoft Defender. It’s built in to Windows, it updates automatically with the Windows Update utility, it has a minimal impact on performance, and it’s free. To be effective, an antivirus application need to integrate with the operating system on a very deep level. Who better to know the internals of Windows than the people who built it? Plus, it won’t try to sell you other products or inject other features you don’t need, like some antivirus programs do.

Windows defender is aupdated and active.

RELATED: What’s the Best Antivirus for Windows 10? (Is Windows Defender Good Enough?)

However, in addition to antivirus, we also recommend using Malwarebytes alongside your antivirus. Just like your belt can use a good pair of suspenders to give it a little help, applications like Malwarebytes can provide extra protection against malicious software that traditional antivirus products may not identify. Malicious programs like browser re-directors and advertisement injectors behave exactly like some known legitimate network filters. They’re not technically viruses, but you definitely don’t want them. Anti-malware applications can help you with those. Malwarebytes offers a premium trial for two weeks, then it is $40 per year, but you can get some of its features for free.

MalwareByte's premium trial.

With that one-two punch combo, you should be safe from a lot of the threats out there.

Craft Better Passwords, and Automate Them

RELATED: Your Passwords Are Terrible, and It’s Time to Do Something About It

You probably know passwords are important, but you probably don’t know how important — and how terrible most people’s passwords actually are.

Here’s the thing: we’re no longer in the olden days of the internet, where you can just use the same password everywhere and call it a day. Services get hacked all the time, and if you’re using the same password everywhere, you’ve given someone access to all of your accounts when one service leaks information. You need to use long passwords and you need to use different ones on every site and service.

To do this, I recommend everyone use a password manager like LastPass. It’ll automatically generate passwords for you, save them securely in one central place, and even automatically insert them for you as you browse. Password managers will also save you from phishing and typosquatting.

LastPass main screen.

You should also have a password or PIN on your computer and a passcode on your phone, too. I know, I know, it’s inconvenient. But while it may take a few seconds longer than just hitting one button, it’s an easy and important way to keep your information secure. Having a password on your computer and phone will stop random people from just picking up and using your device.

Think of all the information on your cell phone. Now think of all the websites you’re logged into on your computer. Would you want a stranger having all that access? Do you know how easy it is to lose your phone or laptop? You need to have a password on your computer and phone. No exceptions.

Windows 10 login screen.

RELATED: PSA: Encrypt Your PC, Phone, and Tablet Now. You’ll Regret It Later If You Don’t

But that’s not all. A good password is like a really good lock on the door, but locks can be picked. Adding encryption turns that door into a bunker. If you encrypt your computer or phone, you prevent thieves from getting to your data by other more advanced means. We recommend using BitLocker on Windows if you have Windows Pro or Enterprise, or VeraCrypt if you have Windows Home. Mac users should turn on FileVault. iPhones and Android phones are usually encrypted by default these days, but you can double check in the settings to be sure.

RELATED: What is Typosquatting and How Do Scammers Use it?

Never Leave Your Phone or Computer Unattended

A laptop left open on a park bench.

This may seem obvious, but it deserves saying: never, ever, ever leave your computer or phone unattended in public. On your coffee table in your house? Sure. On your table at Starbucks? No way. Doing so is asking for it to be stolen.

If your device gets stolen, the best case scenario is you losing your expensive device. But if you leave something unattended and you haven’t followed all of the above advice, the worst case scenario is that someone has your expensive gadget and all of your personal information. All it takes is a kid with slightly-more-than-basic computer knowledge to get at all your data, and if they have your computer in their hands, it’s a lot easier (if you don’t use encryption — see above).

Know Which Links Are Safe to Click

RELATED: Online Security: Breaking Down the Anatomy of a Phishing Email

You hear it all the time: don’t open emails or direct messages (DMs) from people you don’t know, and don’t click on links you don’t trust. But that isn’t enough. A lot of times, malicious links can come from friends who have been infected, or from emails, messages, or texts that look legitimate, but are actually fake. This is known as phishing. Phishing takes many forms — ranging from emails, to Facebook schemes, to personalized text phishing.

RELATED: Beware These 7 Facebook Scams

If you want to be truly secure, you could never click on links you’re sent. But that’s just not realistic or convenient, although we do recommend against clicking email links to sensitive locations like your bank’s website. Just head to your bank’s website normally. For other links, the middle ground option is knowing how to investigate a link before you click on it — yes, even ones from your friends.

The link's address is shown in the bottom left corner of your browser.

First, check is if this link goes where it says it goes. If you hover your cursor over the link, the destination should pop up at the bottom of your browser window. If it doesn’t, right-click on the link and select “Copy link address.” You can then paste this somewhere safe (like a Notepad document) and examine it.

If the link says “”, but the real destination says “”, something is suspicious, and you shouldn’t click. Remember, just because it has the word “ebay” in it doesn’t mean it’s going to Ebay, either — it needs to be before that “.com” to be truly legitimate.

Be Careful About Programs You Download and Run (and Stop Pirating Software)

This tip may also seem obvious — you hear it all the time, and probably think you follow it. But so much of the malware Windows users encounter seems to be as a result of accidentally downloading and installing bad software.

So always be careful about the programs you download and run. Only download and run software that’s widely known and trustworthy, or recommended by trustworthy sites. Make sure you always get the software from its official website — -if you want to download VLC, download it from VLC’s official website. Don’t click a “Download VLC” banner on another website and download it from someone else that may bundle malware or adware along with it. Even if you’re using a search engine, make sure it’s leading you to the real site.

RELATED: How to Avoid Installing Junk Programs When Downloading Free Software

And, when downloading software, be sure to watch out for advertisement banners disguised as “Download” links that will take you elsewhere and try to trick you into downloading possibly malicious software. And uncheck any bundled software that comes with a program—even a legitimate one.

Be aware that there are many different types of “programs” — for example, screensavers in .SCR format are essentially just programs and could contain harmful malware. We’ve got a list of 50+ different types of file extensions that are potentially dangerous on Windows.

A warning from Windows about an installer.

Lastly, and this should go without saying, stop pirating software. When you acquire pirated or cracked software from peer-to-peer networks or shady websites, you’re taking a big risk. By running an .exe file from such locations, you’re trusting the distributor to not do anything harmful. Worse yet, the cracks you may need to run to make such software work properly are made by software-cracking groups. You can’t know if they’ve included malware or not.

Don’t Trust Any Popup Notifications

Similarly, never download or install something you didn’t go looking for. If a website tells you Flash is out of date, Chrome needs to be updated, or an extension needs to be added, pump your brakes. This is a common trick to get you to install something for an attacker.  Even if you think the pop-up might be legitimate, you still shouldn’t click on it.

An annoying Flash popup.

Let’s use Flash as an example. Flash has been deprecated for years. Even so, it is still common to encounter popups warning you need the latest version to get that cat video to play. If you are accessing a website that has content old enough to actually need Flash, there are better (but not safe) ways to install it. Flash has been totally replaced across most websites, so seeing a popup about it is a gargantuan red flag.

RELATED: Tell Your Relatives: No, Microsoft Won’t Call You About Your Computer

This applies to “tech support”, too. Don’t believe any site that says it’s detected a virus on your system (or any calls from Microsoft), or that it has detected 135 things slowing down your system. If a popup says you have a problem with your computer, don’t click on it. Instead, go to your Start menu, open your antivirus program of choice, and run a scan from there instead. If you’re worried your system is running slowly, there are some easy steps you can take to speed it up.

None of these ideas are particularly high tech. They’re not advanced. They don’t take complex programs or a degree in computer science to implement. They’re simple ways to adjust your behavior that will greatly improve your security — and everyone can (and should) use them.


Source link