=== Browsing Safely===
-
Avoid clicking on everything. There are thousands of banner ads and popups on the internet that are designed to get your attention and make you click. Due to the way most modern browsers work, there are very few ways for you to get infected with something online UNLESS you click on it yourself. This means you should avoid clicking on banners for offers that are too good to be true.
-
Make sure your browser is configured to always ask before running files and downloading automatically. If you have to confirm everything, you are much less likely to get infected.
-
Beware of misleading popups. Some of the most nefarious popups on the internet are designed to mimic the look of legitimate anti-virus software. These popups attempt to trick the user into thinking their antivirus software has found an infection.
-
When you click the popup, however, the adware is actually installed. Instead of clicking the warning, close the popup window and open the antivirus program on your computer. You most likely will not see any warnings. If you are still worried, run a scan using your installed software.
-
Don't try clicking the "X" to close the popup window, as this will usually lead to more popups or actually triggering the infection. Instead, use the Task Manager to close it. (You can open Task Manager by pressing Ctrl+Shift+Esc)
-
Other popups may warn of an infection that only their software can fix. No legitimate antivirus company will advertise their product this way, so avoid clicking on any of these popups.
-
Consider a different browser. If you are using Internet Explorer or an older unsupported browser such Safari for Windows, you may be leaving yourself exposed to security risks. Regularly updated browsers such as Chrome, Firefox, and Opera are much more secure than older browsers, and more customizable. Chrome & Firefox, for example, has a large array of privacy- and security-related add-ons that will help protect you online.
-
If you don't want to switch browsers, make sure that it is always up to date to help prevent unauthorized attacks.
-
Don't go where you're not supposed to. Since viruses are distributed through shady means, they thrive on illegal sites. Avoid sites that let you download copyrighted content or other illegal communities. File sharing is a quick way to get infected files. You will find that your computer is much less prone to infection if you avoid things you shouldn't be doing.
-
Besides viruses from files you download, many of these sites will have a litany of annoying popups and misleading advertisements. All of these could lead to virus and spyware infection.
=== Handling Downloaded Files===
-
Be selective with your downloads. There are programs available for nearly every task you can think of, but ask yourself if you really need the program that you are about to download. Do a little research about your task; you may find that you already have a program capable of what you want to do. Downloading extra programs for every task you want to complete increases the likelihood that you'll download something malicious.
-
Download from trusted locations only. If you are downloading a program or other piece of software, it is always advisable to try to download it from the developer's site as opposed to a download service. Many of these services install their own download managers, and can infect your browser with adware.
-
Downloading illegal files will always be a lottery when it comes to getting viruses and worms. If you can, download from "trusted" sources in the community to reduce the risk of infection.
-
Look at the extension. Mischievous files often have fake extensions designed to trick you, such as ".txt.vb" or ".jpg.exe". Windows will often hide common file extensions to make browsing through your files and programs more visually appealing. Double extensions exploit this by hiding the second, dangerous extension. If you normally don't see extensions on your computer and it all of a sudden appears on a file that you've downloaded, you may have downloaded a malicious file that is hiding as something else.
-
To make your file extensions visible, open Windows Explorer, click the View tab/menu and select Options. Click the View tab in the Folder Options window, and uncheck the "Hide extensions for known file types" box.
-
Scan your downloaded files. If you have an antivirus program installed, you should make a habit of scanning files that you've downloaded from unknown locations. Most antivirus programs allow you to immediately scan specific files by right-clicking on the file and selecting your antivirus from the list of options.
-
Always scan ZIP files as these often contain multiple files in one archive.
-
Email programs will often scan your email files for viruses automatically, but you should still scan any downloaded files with your own antivirus program.
-
Don't open anything you don't trust completely. A virus or worm can do nothing unless you actually run the program that it is attached to. That means that simply downloading a file does not put you in any real danger. If you decide after downloading that you don't exactly trust the file, avoid opening it or delete it until you can confirm its integrity.
-
Read the license agreement. You know those legal documents that you always blindly accept when installing a program? Well, shady companies like to use the fact that most people skip them to sneak in clauses about installing spyware and other malicious software. Make sure to take the time to read these agreements, especially from companies that you've never heard of before.
=== Dealing with Emails===
-
Don't download attachments from a source you don't know. Email attachments are the number 1 way that viruses and other malware get spread. You should never click an attachment or link in an email from someone you don't recognize. If you are unsure of the sender, get confirmation from them that the file is legitimate before downloading it.
-
Don't download attachments from a source you DO know unless you were expecting it. Many times people will get infected with viruses that send emails without their knowledge. This means you can receive email from trusted sources but the email itself is not trustworthy. If the writing is odd or the attachment looks off, do not click it. Verify with the person that they intended to send you the attachment you received.
-
Disable image previews. Many email applications can automatically load images for convenience, but this can leave you more vulnerable, as images can contain malicious code. You should only download the images in an email from a trusted source.
-
Note: Some services have started changing way email images are handled, making image loading safer. For example, Gmail no longer disables images on default. Check with your mail provider for the best practices on their service.
-
Beware of odd emails from companies you do business with. A popular phishing technique is to copy the style of a company email and include links that look similar to the regular URL, but instead send you to a fake site ("povver" instead of "power", for example). These sites then collect personal information that you though was going to a trusted server.
-
Any legitimate company will never ask you for passwords or other personal information through email.
=== Protecting Yourself===
-
Install an antivirus program. An antivirus program will actively protect your computer from virus infections by scanning active programs and performing scheduled full-system scans. There are free antivirus programs that come with basic virus protection, such as AVG, Bitdefender, and Avast, and there are paid programs that come with other internet security protections such as firewalls and anti-phishing measures. Paid programs include Kaspersky, ESET, and paid versions of free antivirus options.
-
You should only have one antivirus installed at a time in order to avoid conflicts between them.
-
Make sure that your antivirus gets updated at least every week.
-
Scan your computer at least weekly, more often if you are heavy internet user.
-
An antivirus program is not a foolproof system, and should not replace good browsing habits and common sense.
-
Install an anti-spyware program. Beyond viruses, your computer can also get infected with spyware and adware. These programs are difficult to exterminate and often hijack your browsing experience. They also make your computer more susceptible to future infection. Most antivirus programs do not scan for or remove spyware and adware.
-
If you are using Windows XP or Windows Vista, upgrade (if possible) or replace immediately. Support for these version has ended. This means that any exploitable flaws found, will no longer be fixed by Microsoft, and your system will be very unsecure and open to the worst security threats out there.
-
Be careful with USB drives. USB drives are a popular vehicle for virus transmissions, usually without the owner being aware at all. You could get an infection just by inserting the USB drive, or could get your USB drive infected by plugging it into a public computer. Try to use other methods for file sharing, such as online storage or email to send files.
-
Be wary about remote access. In our more connected world, remote access and remote sharing of resources has become much more prevalent. While this can be great for productivity, it does put your personal machine at more risk if there are a variety of other machines connecting directly to it. Ask yourself if you need that remote connection, and always ensure that your protection software is up to date.
-
Keep a good backup. If disaster strikes, you don't want to be left without your important data. A regular backup schedule will mitigate any damage done by a virus, and will allow you to get up and running much quicker. There are a variety of ways that you can go about backing up your data, both locally and remotely.
== Other Tips ==
-
Keep a recent backup of your personal files. This will come in handy should you get infected with a program that deletes your files, or prevents you from accessing them.
-
Delete your browser's temporary internet files every day.
-
Remember: if it seems suspicious, it probably is.
== Warnings ==
(Source & Citations)
|
|