25 Essential Tips for Comprehensive Computer Virus Protection

Computer viruses can wreak havoc on your system, causing data loss, slowing down performance, and even leading to identity theft. Protecting your computer from these threats is crucial. This guide provides essential tips and steps to protect your computer from viruses and malware using a combination of best practices and lesser-known strategies.

This is a long article so I have created a PDF file and stored it on Google Drive for you to download.

Best Practices to Protect Against Computer Viruses

1. Install a Reliable Antivirus Program

Not everyone can get away with using free Anti-virus software because it depends what you do on your computer. It depends on factors such as if you download files or not, if you open email attachments, and if you surf suspicious websites.

Using a reliable antivirus program is the first line of defence against computer viruses. Programs like Norton, McAfee, and Malwarebytes offer comprehensive protection by scanning your system for malware and providing real-time protection.

People often try to install more than one anti-virus program to protect their computers from viruses. This is not how to protect your computer from viruses as installing more than one program always causes a problem. You can only install one virus removal program at any one time. See this post about what tools to use after you have removed a virus.

2. Keep Your Software Updated

Regularly updating your operating system and software ensures that you have the latest security patches. Many virus attacks exploit vulnerabilities in outdated software. Enable automatic updates to make sure you are always protected.

You can simple check to see if your computer needs updates by going to he start menu and typing in “windows update”. Also see how to access Windows Updates through the run command box.

How to Prevent Computer Viruses from Infecting Your PC

3. Be Cautious with Email Attachments

Email attachments are a common way for viruses to spread. Never open attachments from unknown senders, and be wary of unexpected attachments from known contacts. Use an email service that scans attachments for malware. If an email requires you to sign into an account, for example Paypal, I suggest you go to Paypal.com and sign in there. Do not use the link provided in an email.

You can also create a whitelist so only certain emails get through. You will still have to be careful though, as you do not know what security the sender has installed on their computer. It’s like driving on the road, you need to watch how others are driving to stay safe.

4. Avoid Downloading from Untrusted Sources

Download software only from reputable websites. Do not use peer to peer (p2p) file sharing programs. These include programs such as Limewire, Bearshare, Gnutella, Morpheus, Torrents, etc. These programs let you download files from other computer users connected to their program network. You have no way of knowing what you are actually downloading until it is on your computer.. Verify the authenticity of the website and read user reviews before downloading.

Effective Ways to Safeguard Your Computer from Viruses

5. Use Strong Passwords

Using strong, unique passwords for each of your accounts is one of the most effective ways to prevent unauthorized access to your personal information and online accounts. A strong password typically includes a combination of uppercase and lowercase letters, numbers, and special characters, making it difficult for hackers to guess or crack. Here are some tips and best practices for creating and managing strong passwords:

  1. Create Complex Passwords: Avoid using easily guessable information like birthdays, names, or common words. Instead, create passwords that are at least 12 characters long and include a mix of letters (both uppercase and lowercase), numbers, and special characters. For example, a strong password could be P@ssw0rd!2024#Secure.
  2. Use Unique Passwords for Each Account: Reusing passwords across multiple accounts increases the risk that a breach on one site could compromise your other accounts. Ensure that each of your online accounts has a distinct password.
  3. Employ a Password Manager: Remembering multiple complex passwords can be challenging. A password manager can help generate, store, and manage your passwords securely. Popular password managers like LastPass, Dashlane, and 1Password can create strong passwords and store them encrypted, accessible only to you.
  4. Enable Two-Factor Authentication (2FA): Enhance your password security by enabling two-factor authentication on your accounts. 2FA adds an extra layer of security by requiring a second form of verification, such as a text message code or authentication app, in addition to your password.
  5. Regularly Update Your Passwords: Periodically changing your passwords can further protect your accounts. Set a reminder to update your passwords every few months, especially for sensitive accounts like email, banking, and social media.
  6. Be Cautious of Phishing Attempts: Hackers often use phishing attacks to steal passwords. Be wary of emails or messages that ask for your login details, and always verify the authenticity of the sender before clicking on links or providing personal information.

By following these guidelines and utilizing tools like password managers, you can significantly enhance the security of your online accounts and protect yourself from unauthorized access.

Strong, unique passwords for each of your accounts can prevent unauthorized access. Consider using a password manager to generate and store complex passwords securely.

6. Enable Firewall Protection

A firewall is a critical component of your computer’s defense system, acting as a barrier between your device and potential threats from the internet. Firewalls monitor incoming and outgoing network traffic, blocking unauthorized access while allowing legitimate communication to pass through. Here’s why enabling firewall protection is essential and how to ensure it’s properly configured on your system.

Importance of a Firewall

Firewalls serve as the first line of defense against cyber threats. They prevent hackers from gaining access to your system by filtering incoming traffic and blocking suspicious connections. Additionally, firewalls can stop malware from communicating with remote servers, thereby preventing data theft and further infection.

Types of Firewalls

There are two primary types of firewalls: hardware and software.

  • Hardware Firewalls: These are physical devices, often integrated into routers, that protect an entire network. They are particularly useful for businesses or homes with multiple devices connected to the internet.
  • Software Firewalls: These are programs installed on individual computers. Windows and macOS come with built-in firewall software that provides robust protection for single devices.

Enabling and Configuring Your Firewall

For Windows users:

  1. Open the Control Panel and navigate to System and Security.
  2. Click on Windows Defender Firewall.
  3. Ensure the firewall is turned on for both private and public networks.
  4. Use the Advanced Settings to configure inbound and outbound rules for specific applications, enhancing your security setup.

Steps to Access Windows Defender Firewall From Run Box:access windows firewall

  1. Open the Run Dialog Box: Press Win + R on your keyboard to open the Run dialog box.
  2. Enter the Command: Type control firewall.cpl in the Run dialog box and press Enter.

See the screenshot below of the Windows Firewall Status.

protect against viruses enable firewall

For macOS users:

  1. Go to System Preferences and select Security & Privacy.
  2. Click on the Firewall tab.
  3. Unlock the settings by clicking the padlock and entering your admin password.
  4. Turn on the firewall and use the Firewall Options to customize rules and permissions for applications.

Additional Tips for Firewall Protection

  • Regular Updates: Keep your firewall software updated to protect against the latest threats.
  • Monitor Alerts: Pay attention to firewall alerts and investigate any suspicious activity.
  • Combine with Other Security Tools: Use a firewall in conjunction with antivirus software and other security measures for comprehensive protection.

By enabling and properly configuring your firewall, you create a robust barrier that significantly reduces the risk of unauthorized access and cyber attacks. This essential step helps ensure your system remains secure and your data protected.

Tips for Protecting Your Computer from Malware and Viruses

7. Regularly Back Up Your Data

Regularly backing up your data is a critical step in protecting your computer from the detrimental effects of viruses and malware. This practice ensures that even if your system is compromised, you won’t lose important files and documents.

Why Backup is Essential

Viruses can cause severe damage to your files, corrupting them or even rendering them completely inaccessible. In some cases, malware may encrypt your files, demanding a ransom for their release. By maintaining regular backups, you create a safety net that allows you to restore your data without succumbing to these malicious demands.

There are two primary methods for backing up your data: external hard drives and cloud services.

SEE Choosing the Right Backup Method

Best Practices for Data Backup

  1. Schedule Regular Backups: Set a schedule for automatic backups to ensure your data is consistently protected. Weekly or even daily backups can significantly reduce the risk of data loss.
  2. Verify Backup Integrity: Periodically check your backups to ensure they are complete and uncorrupted. This step is crucial to confirm that you can successfully restore your data when needed.
  3. Use Multiple Backup Solutions: Combining both external hard drives and cloud services provides a layered approach to data protection, increasing the chances of data recovery in various scenarios.
  4. Encrypt Sensitive Data: For additional security, encrypt your backups, especially if they contain sensitive or personal information. This ensures that even if your backup media is lost or stolen, your data remains protected.

By following these practices, you can ensure that your data is secure and recoverable, even in the face of severe virus infections. Regular backups are an essential component of a robust computer security strategy.

8. Be Wary of Phishing Scams

Phishing scams are deceptive attempts by cybercriminals to steal your personal information by posing as legitimate entities. These scams often come in the form of emails, text messages, or websites that appear to be from trusted sources, such as banks, online retailers, or even government agencies. Falling victim to a phishing scam can lead to severe consequences, including identity theft, financial loss, and unauthorized access to your accounts.

Recognize Phishing Attempts

To protect yourself from phishing scams, it’s crucial to recognize the common signs:

  1. Urgent Requests: Phishing emails often create a sense of urgency, claiming that your account will be suspended or you will miss out on an important opportunity if you don’t act immediately.
  2. Generic Greetings: Legitimate companies typically address you by your name. Be suspicious of emails that use generic greetings like “Dear Customer” or “Dear User.”
  3. Suspicious Links: Hover over links in emails without clicking to see the actual URL. Phishing links often lead to websites that look legitimate but have slight variations in the URL.
  4. Attachments: Be cautious of unexpected email attachments, especially from unknown senders. These can contain malware or viruses.

Verify Authenticity

Always verify the authenticity of emails and websites before entering sensitive information:

  1. Direct Contact: If you receive an email requesting personal information, contact the company directly using a phone number or email address from their official website, not the contact information provided in the suspicious email.
  2. Secure Websites: Ensure that websites are secure by checking for “https://” in the URL and a padlock icon in the address bar before entering any personal information.
  3. Spelling and Grammar: Many phishing emails contain spelling and grammatical errors. Legitimate companies typically proofread their communications.

Use Security Tools

  1. Anti-Phishing Toolbars: Install anti-phishing toolbars in your web browser. These toolbars compare the websites you visit against known phishing sites and warn you if you encounter any.
  2. Email Filters: Use email filters to automatically detect and move suspected phishing emails to your spam or junk folder.
  3. Security Software: Keep your security software updated. Many antivirus programs include features that detect phishing attempts and block malicious websites.

By staying vigilant and following these steps, you can protect yourself from phishing scams and keep your personal information secure.

Steps to Secure Your Computer from Virus Attacks

9. Disable Autorun for External Devices

Viruses can spread through USB drives and other external devices. Disabling the autorun feature is a crucial step in preventing the automatic execution of malicious files when you connect an external device.

Why Disable Autorun?

When you insert a USB drive or other external media into your computer, the autorun feature can automatically execute files on that device without your permission. This can be a significant security risk, as it allows malware and viruses to infiltrate your system quickly. By disabling autorun, you prevent these files from running automatically, giving you control over what executes on your computer.

How to Disable Autorun in Windows

  1. Open Group Policy Editor:
    • Press Win + R to open the Run dialog box.
    • Type gpedit.msc and press Enter.
  2. Navigate to Autorun Settings:
    • In the Group Policy Editor, go to Computer Configuration > Administrative Templates > Windows Components > AutoPlay Policies.
  3. Configure Settings:
    • Double-click on Turn off AutoPlay.
    • Select Enabled and choose All drives from the dropdown menu.
    • Click Apply and then OK.
  4. Edit the Registry (Alternative Method):
    • Press Win + R to open the Run dialog box.
    • Type regedit and press Enter to open the Registry Editor.
    • Navigate to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.
    • Create a new DWORD value named NoDriveTypeAutoRun if it doesn’t exist.
    • Set the value to FF to disable autorun on all drives.

How to Disable Autorun in macOS

  1. Open System Preferences:
    • Click the Apple menu and select System Preferences.
  2. Navigate to Security Settings:
    • Go to Security & Privacy > General.
  3. Disable Autorun:
    • Uncheck the box next to Allow apps downloaded from to prevent automatic execution of software from external devices.

Benefits of Disabling Autorun

Disabling autorun enhances your computer’s security by giving you the authority to decide which files can run on your system. It prevents malware from exploiting the autorun feature to execute harmful scripts or applications without your consent. This proactive measure can significantly reduce the risk of infections from USB drives and other external devices, ensuring that your computer remains secure.

Taking this step is a straightforward but powerful way to protect your system from potential threats. Always scan external devices with your antivirus software before accessing their contents to add an extra layer of security.

10. Use a Virtual Private Network (VPN)

Using a Virtual Private Network (VPN) is an essential step in protecting your computer from viruses and enhancing your online security. A VPN encrypts your internet connection, creating a secure tunnel between your device and the internet. This encryption ensures that all data transmitted and received is protected from prying eyes, making it significantly harder for hackers to intercept your information.

One of the primary benefits of using a VPN is its ability to safeguard your data when using public Wi-Fi networks. Public Wi-Fi hotspots, such as those found in cafes, airports, and hotels, are often unsecured and can be a breeding ground for cybercriminals looking to steal personal information. By encrypting your connection, a VPN prevents malicious actors from accessing your sensitive data, such as passwords, credit card details, and personal communications.

Additionally, a VPN masks your IP address, providing anonymity online. This makes it more challenging for websites, advertisers, and cybercriminals to track your online activities and gather data about your browsing habits. This layer of anonymity is particularly beneficial for maintaining privacy and avoiding targeted cyberattacks.

When choosing a VPN service, it’s important to consider factors such as speed, reliability, and the provider’s privacy policy. Opt for a reputable VPN provider that offers strong encryption protocols, a no-logs policy, and a wide range of server locations. Some popular VPN services include NordVPN, ExpressVPN, and CyberGhost.

Moreover, VPNs can also help you bypass geographic restrictions and access content that may be blocked in your region. This feature is especially useful for travelers or individuals living in countries with strict internet censorship.

In summary, using a VPN is a powerful tool for enhancing your computer’s security and protecting your online privacy. By encrypting your internet connection and masking your IP address, a VPN provides a robust defense against hackers, particularly when using vulnerable public Wi-Fi networks.

How to Keep Your Computer Safe from Viruses and Malware

11. Educate Yourself on Social Engineering Attacks

Social engineering attacks are among the most cunning and dangerous forms of cyber threats, manipulating individuals into divulging confidential information. These attacks exploit human psychology rather than technical vulnerabilities, making them harder to detect and prevent.

Understanding Social Engineering

Social engineering involves tricking people into breaking normal security procedures. Common tactics include phishing emails, pretexting (pretending to need information for a legitimate reason), baiting (leaving malware-infected devices in places where people will find them), and tailgating (following someone into a restricted area). Phishing, the most prevalent form, often involves emails that appear to be from reputable sources, tricking recipients into clicking malicious links or providing sensitive information.

Why Awareness and Skepticism Matter

Awareness and skepticism are your best defenses against social engineering attacks. Being aware means understanding the various tactics used and being able to recognize suspicious behavior. Skepticism involves questioning the authenticity of unsolicited requests for information and being cautious of urgent or alarming messages that push you to act quickly without thinking.

Practical Steps to Protect Yourself

  1. Verify Identities: Always verify the identity of anyone asking for sensitive information. Use known contact information to confirm their legitimacy.
  2. Be Cautious with Emails: Do not click on links or download attachments from unknown or unexpected emails. Look for signs of phishing, such as misspelled URLs, generic greetings, and requests for personal information.
  3. Educate Yourself Continuously: Stay informed about the latest social engineering techniques. Cybersecurity awareness training can help you and your organization recognize and respond to these threats.
  4. Use Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring two or more verification methods. Even if an attacker obtains your password, they would still need the second factor to gain access.
  5. Report Suspicious Activity: If you receive a suspicious email or phone call, report it to your IT department or the appropriate authorities. Early reporting can help prevent attacks on others.

By educating yourself on social engineering attacks and adopting a sceptical mindset, you can significantly reduce the risk of falling victim to these manipulative tactics. Remember, the human element is often the weakest link in cybersecurity, but with proper awareness and vigilance, it can become one of the strongest defences.

12. Regularly Scan Your Computer for Malware

Even with all precautions, regularly scanning your computer for malware is essential to maintaining a secure system. Malware can enter your computer in many ways, including through email attachments, malicious websites, and compromised software downloads. Therefore, implementing a routine malware scan is a critical aspect of your overall security strategy.

1. Schedule Weekly Scans: Set your antivirus software to perform automatic weekly scans. Most antivirus programs, such as Norton, McAfee, and Malwarebytes, allow you to schedule these scans at a time when your computer is typically on but not heavily used, such as during the night or early morning. Regular scans help detect and remove potential threats before they can cause significant damage.

2. Perform Full System Scans: While quick scans are useful for routine checks, full system scans provide a more thorough examination of your computer. These scans check every file and process on your system, ensuring no hidden malware escapes detection. Full scans are particularly important if you suspect your computer might be infected or if you’ve recently downloaded files from unfamiliar sources.

3. Use Multiple Scanning Tools: No single antivirus solution is perfect. Complement your primary antivirus software with additional tools like Malwarebytes, which can catch threats that other programs might miss. Using multiple layers of defence increases your chances of detecting and eliminating malware.

4. Enable Real-Time Protection: Ensure that your antivirus software’s real-time protection feature is enabled. This feature continuously monitors your system for suspicious activity and can block malware before it has a chance to execute.

5. Keep Your Antivirus Software Updated: Malware developers constantly evolve their tactics to bypass security measures. Regularly update your antivirus software to ensure it has the latest virus definitions and security patches. An outdated antivirus program may fail to recognize new threats.

6. Educate Yourself on Threats: Stay informed about the latest malware trends and threats. Follow security blogs, subscribe to newsletters from your antivirus provider, and participate in online forums. Knowledge is a powerful tool in protecting your computer from malware.

By incorporating these practices into your routine, you can significantly reduce the risk of malware infection and keep your computer running smoothly and securely. Regularly scanning your computer for malware is not just a one-time task but an ongoing process that plays a crucial role in your overall cybersecurity strategy.

Essential Tips for Preventing Computer Virus Infections

13. Utilize Browser Security Features

Modern browsers come equipped with an array of built-in security features designed to safeguard your online experience and protect your computer from malicious threats. By enabling and properly configuring these features, you can significantly reduce the risk of encountering harmful content. Here are some key browser security features and how to make the most of them:

Enable Pop-Up Blockers

Pop-up blockers are essential for preventing unwanted and potentially dangerous pop-ups from appearing while you browse. Many pop-ups are not only annoying but can also contain malicious code or phishing attempts. Most modern browsers, including Chrome, Firefox, Edge, and Safari, have built-in pop-up blockers that you can enable in the settings menu. Ensure this feature is turned on to keep your browsing experience smooth and secure.

Use Safe Browsing and Security Warnings

Safe Browsing features in browsers like Chrome and Firefox warn you about potentially unsafe websites. These browsers use extensive databases of known malicious sites to alert you before you can access them. When you attempt to visit a site flagged as unsafe, your browser will display a warning, advising you not to proceed. Always heed these warnings to avoid exposing your system to malware and phishing attacks.

Enable HTTPS-Only Mode

HTTPS-Only Mode ensures that your browser only connects to websites using the secure HTTPS protocol, which encrypts data exchanged between your browser and the website. This encryption helps protect your sensitive information from being intercepted by hackers. Browsers like Firefox offer HTTPS-Only Mode as an option in their security settings. Enabling this feature adds an extra layer of security, especially when handling personal or financial data online.

Manage Browser Extensions

Browser extensions can enhance your browsing experience but can also pose security risks if they come from untrusted sources. Regularly review and manage your installed extensions, ensuring they are from reputable developers. Disable or remove any extensions that you no longer use or that seem suspicious. Additionally, browsers like Chrome and Edge offer permissions settings for extensions, allowing you to control what data they can access.

Keep Your Browser Updated

Ensuring your browser is up-to-date is crucial for maintaining security. Browser updates often include patches for newly discovered vulnerabilities. Enable automatic updates in your browser settings to guarantee that you always have the latest security enhancements and features.

By effectively utilizing these built-in security features, you can protect your computer and personal information from a wide range of online threats, ensuring a safer browsing experience.

14. Monitor Your Network for Suspicious Activity

Monitoring your network for suspicious activity is a crucial step in protecting your computer from viruses and malware. By regularly checking your network activity, you can detect unusual behavior that may indicate a security threat, such as unauthorized access, data exfiltration, or malware communication with command-and-control servers.

Why Monitoring Network Activity is Important

Network monitoring helps you identify and respond to threats before they cause significant damage. It provides visibility into the data entering and leaving your network, allowing you to spot anomalies that could indicate an ongoing attack. For example, unexpected spikes in data transfer, unknown devices on the network, or unusual outbound connections could all be signs of malicious activity.

Tools for Network Monitoring

Several tools can assist in monitoring and analyzing your network traffic. One of the most powerful and widely-used tools is Wireshark. This open-source packet analyzer allows you to capture and interactively browse the traffic running on a computer network. With Wireshark, you can filter and inspect packets to understand the nature of the traffic and identify any suspicious patterns.

Using Wireshark for Network Monitoring

  1. Install Wireshark: Download and install Wireshark from its official website. Ensure you have administrative privileges, as network monitoring requires access to network interfaces.
  2. Capture Traffic: Open Wireshark and select the network interface you want to monitor. Click on the start button to begin capturing traffic.
  3. Filter Traffic: Use Wireshark’s powerful filtering options to focus on specific types of traffic or IP addresses. For example, you can filter for HTTP traffic to inspect web connections or DNS traffic to look for unusual domain resolutions.
  4. Analyze Packets: Examine the captured packets for any anomalies. Look for unusual protocols, unexpected IP addresses, or excessive data transfers that could indicate malware communication or data exfiltration.
  5. Save and Report: Save your capture files and generate reports to document any suspicious activity. This can be useful for further investigation or reporting to your IT security team.

Additional Tips for Effective Network Monitoring

  • Automate Alerts: Set up automated alerts to notify you of suspicious activity in real-time. Many advanced network monitoring tools offer this feature, helping you respond swiftly to potential threats.
  • Regular Audits: Perform regular audits of your network traffic and device connections. Ensure all connected devices are authorized and secure.
  • Stay Informed: Keep abreast of the latest network security threats and trends. Regularly update your network monitoring tools to take advantage of new features and threat intelligence.

By diligently monitoring your network for suspicious activity, you can significantly enhance your computer’s security and mitigate the risk of virus and malware infections.

Comprehensive Guide to Computer Virus Protection

15. Understand File Extensions and Types

Understanding file extensions and their associated risks is a crucial step in protecting your computer from malware. File extensions are suffixes at the end of file names that indicate the file type and the program needed to open them. Common examples include .docx for Word documents, .jpg for images, and .mp3 for audio files. However, malware often disguises itself by using familiar or deceptive file extensions to trick users into executing harmful software.

Executable Files (.exe, .bat, .com)

Executable files, such as .exe, .bat, and .com, are the most common carriers of malware. These files can run code on your computer, potentially giving hackers control over your system. Always be cautious when downloading and opening executable files, especially if they come from unknown sources or unexpected emails.

Double Extensions and Hidden Extensions

Malware creators often use double extensions (e.g., document.pdf.exe) to deceive users. Windows, by default, hides known file extensions, which can make these malicious files appear safe (e.g., as document.pdf). To avoid falling for this trick, configure your system to show all file extensions. This can be done in the File Explorer by going to the “View” tab and checking the “File name extensions” box.

Script Files (.js, .vbs, .ps1)

Script files, such as .js (JavaScript), .vbs (VBScript), and .ps1 (PowerShell), can automate tasks but also pose security risks. These files can execute commands that download and install malware. Be particularly wary of email attachments or downloads with these extensions.

Macro Files (.docm, .xlsm)

Microsoft Office files with macros (e.g., .docm, .xlsm) can contain embedded code. While macros can automate tasks within documents, they can also be exploited to deliver malware. Disable macros by default and only enable them if you trust the source.

Compressed Files (.zip, .rar)

Compressed files, such as .zip and .rar, can contain multiple files, including malicious ones. Scanning these files with antivirus software before extracting their contents is essential.

By understanding file extensions and exercising caution with unfamiliar or suspicious files, you can significantly reduce the risk of malware infections. Always verify the source and integrity of files before opening them to keep your system secure.

Configure Your Antivirus for Maximum Protection

Ensuring your antivirus software is configured for maximum protection is crucial in safeguarding your computer from viruses and malware. While installing an antivirus program is a good first step, fine-tuning its settings can significantly enhance your security.

Enable Real-Time Scanning

Real-time scanning is a feature that continuously monitors your computer for malicious activity. It checks files and programs as they are opened or executed, providing immediate detection and prevention of potential threats. Ensure this feature is always turned on to intercept malware before it can cause harm.

Activate Email Scanning

Email remains a common vector for malware distribution. Enable email scanning to check incoming and outgoing emails for suspicious attachments and links. This feature helps prevent phishing attacks and the spread of malware via email. Most antivirus programs offer this option, which can be activated through the settings menu.

Schedule Regular Scans

While real-time scanning provides ongoing protection, scheduling regular full-system scans ensures thorough examination of your computer. Set your antivirus to perform deep scans weekly or bi-weekly during times when the computer is not in use, like overnight. This routine helps detect and remove any hidden threats that might have slipped through real-time scanning.

Enable Automatic Updates

Cyber threats are constantly evolving, and antivirus software must stay updated to effectively counter new malware. Enable automatic updates to ensure your antivirus database and software receive the latest security patches and definitions. This keeps your protection mechanisms current against the latest threats.

Utilize Advanced Features

Many antivirus programs come with advanced features such as behavior-based detection, heuristic analysis, and firewall integration. Behavior-based detection monitors the behavior of programs and blocks suspicious activities, while heuristic analysis detects new, unknown threats by analyzing code behavior. Firewall integration adds an extra layer of defense by monitoring network traffic and blocking unauthorized access. Make sure to explore these features and activate them for enhanced security.

Configure Notifications and Reports

Set up your antivirus software to provide real-time notifications and regular reports on its activities. This keeps you informed about the status of your system’s security and any actions taken by the antivirus. Monitoring these reports helps you stay aware of potential threats and the overall health of your computer’s security.

By properly configuring your antivirus software, you can significantly improve its effectiveness in protecting your computer from viruses and malware. Regularly review and update your settings to ensure optimal performance and protection.

How to Protect Your PC from Viruses and Malware

16. Limit User Privileges

Limiting user privileges is a crucial step in enhancing your computer’s security. By creating separate accounts for different users and restricting administrative privileges, you can significantly reduce the risk of unauthorized changes to system settings and malware infections.

Why Limit User Privileges?

When users operate with full administrative privileges, they have the power to make significant changes to the system, including installing software and altering system settings. This level of access can be dangerous if a user inadvertently downloads malware or makes critical changes that compromise the system’s security. By limiting privileges, you can prevent such scenarios and maintain a more secure computing environment.

Steps to Limit User Privileges

  1. Create Separate User Accounts:
    • Go to the “Control Panel” and select “User Accounts.”
    • Choose “Manage another account” and then “Create a new account.”
    • Set up standard user accounts for daily activities and reserve administrative accounts for tasks that require higher-level access.
  2. Restrict Administrative Privileges:
    • For each user account, ensure they are set to “Standard User” rather than “Administrator.”
    • This restriction prevents users from installing unauthorized software or making changes that could affect the entire system.
  3. Use Group Policies (Windows):
    • Utilize Group Policy settings to enforce user restrictions across multiple accounts.
    • Access the Group Policy Editor by typing gpedit.msc in the Run dialog (Windows Pro versions).
    • Navigate to “User Configuration” > “Administrative Templates” to configure specific policies.
  4. Implement User Account Control (UAC):
    • UAC prompts users for permission or an administrator password before allowing actions that could affect the system’s stability or security.
    • Ensure UAC is enabled by going to “Control Panel” > “System and Security” > “Change User Account Control settings.”
  5. Monitor User Activity:
    • Regularly review user activities and audit logs to detect any unauthorized attempts to access or modify system settings.
    • Use built-in tools like the Event Viewer to monitor and analyze security logs.

Benefits of Limiting User Privileges

  • Enhanced Security: Prevents malware from installing and spreading through the system.
  • System Stability: Reduces the risk of accidental or malicious changes to system settings.
  • Data Protection: Limits access to sensitive data, ensuring that only authorized users can make changes.
  • Compliance: Helps meet organizational security policies and regulatory requirements.

Here is a video showing how to change a user password or even create a new user from the CMD prompt.

By limiting user privileges, you create a more controlled and secure computing environment, reducing the risk of malware infections and unauthorized system changes. This proactive approach is a fundamental aspect of comprehensive computer virus protection.

17. Stay Informed About the Latest Threats

Cyber threats are constantly evolving, making it crucial to stay informed about the latest virus and malware threats to protect your computer effectively. Here’s how you can stay ahead of potential risks and ensure your system’s security:

Follow Security Blogs and Websites: Cybersecurity experts and organizations regularly publish updates and insights on their blogs and websites. Resources like Krebs on Security, Threatpost, and the official blogs of antivirus companies like Norton, McAfee, and Malwarebytes provide valuable information on emerging threats and cybersecurity trends. These sources offer detailed analyses of new malware, attack vectors, and defense strategies.

Subscribe to Security Newsletters: Many cybersecurity firms and news websites offer newsletters that deliver the latest security news directly to your inbox. Subscribing to these newsletters ensures you receive timely updates on the latest threats and vulnerabilities. Examples include the SANS Internet Storm Center newsletter and the newsletters from major antivirus companies.

Enable Notifications from Your Antivirus Provider: Most antivirus programs have options to enable notifications for security updates and threat alerts. Ensure these notifications are turned on so you can receive immediate alerts about new viruses, malware, and security patches that your antivirus provider releases.

Join Online Security Communities: Participate in online forums and communities dedicated to cybersecurity, such as Reddit’s r/cybersecurity or specialized forums like BleepingComputer. These communities are excellent for discussing the latest threats, sharing information, and learning from the experiences of others.

Follow Cybersecurity Influencers on Social Media: Many cybersecurity experts and organizations share real-time updates and insights on social media platforms like Twitter and LinkedIn. Following influencers and professionals in the field can help you stay updated with the latest news and trends.

Attend Webinars and Conferences: Cybersecurity webinars, workshops, and conferences are great for learning about new threats and defense mechanisms. Events like Black Hat, DEF CON, and webinars hosted by security companies provide in-depth knowledge and networking opportunities with experts.

By actively seeking information and staying engaged with the cybersecurity community, you can better protect your computer against the latest threats and ensure your system remains secure.

Methods to Avoid Computer Virus Infections and Attacks

Use Ad Blockers to Enhance Your Computer Security

19. Use Ad Blockers

Ad blockers are an essential tool in the fight against malicious software and unwanted advertising. These handy browser extensions or standalone programs prevent ads from appearing on the websites you visit, significantly reducing the risk of encountering harmful content. Here’s why ad blockers are crucial for your computer security and overall browsing experience.

Preventing Malicious Ads

Malicious ads, or “malvertising,” are a common way for cybercriminals to spread malware. These ads can be embedded in seemingly legitimate websites, and when clicked, they can download malware onto your computer without your knowledge. By blocking these ads, ad blockers help protect your system from infections that can lead to data breaches, financial loss, and identity theft.

Enhancing Browsing Speed and Performance

Ads can slow down your browsing experience by consuming bandwidth and processing power. With an ad blocker, web pages load faster, providing a smoother and more enjoyable browsing experience. This is particularly beneficial for users with slower internet connections or older devices.

Reducing Clutter and Improving User Experience

Ads can clutter web pages, making it difficult to find the content you are interested in. Ad blockers streamline your browsing experience by removing these distractions, allowing you to focus on the information that matters most. This cleaner interface not only enhances usability but also reduces eye strain and improves overall satisfaction.

Protecting Privacy

Many ads track your browsing behavior to serve targeted advertisements. This can lead to privacy concerns as your data is collected and analyzed by third parties. Ad blockers can prevent these tracking mechanisms, giving you greater control over your personal information and enhancing your online privacy.

Choosing the Right Ad Blocker

There are numerous ad blockers available, each with its own set of features. Popular options include uBlock Origin, Adblock Plus, and Ghostery. When choosing an ad blocker, consider factors such as ease of use, customization options, and compatibility with your preferred browser. Additionally, some ad blockers offer advanced features like anti-tracking, anti-phishing, and malware protection, providing a comprehensive security solution.

In conclusion, using an ad blocker is a simple yet effective way to protect your computer from malicious ads, improve browsing speed, reduce clutter, and safeguard your privacy. By incorporating an ad blocker into your cybersecurity toolkit, you can enjoy a safer and more pleasant online experience.

20. Implement Email Filtering

Configuring your email settings to filter out spam and phishing emails is a crucial step in protecting your computer from viruses and malware. Unwanted and malicious emails are common vectors for cyber attacks, often containing harmful attachments or links that can compromise your system. Here’s how to implement effective email filtering:

Advanced Filtering Options

Most modern email services, such as Gmail, Outlook, and Yahoo Mail, come equipped with robust spam filters. These filters automatically detect and segregate spam emails from your primary inbox. However, you can enhance these settings for better protection.

  • Enable Spam Filters: Ensure that your email service’s spam filter is turned on. This setting is typically enabled by default but it’s good practice to verify it.
  • Adjust Spam Sensitivity: Many email services allow you to adjust the sensitivity of spam detection. Set it to a higher level to catch more spam emails, but keep an eye on your spam folder to ensure legitimate emails aren’t being mistakenly filtered.

Phishing Protection

Phishing emails are designed to trick you into providing personal information or downloading malicious software. To combat this:

  • Use Phishing Filters: Enable phishing filters if your email service provides them. These filters specifically look for signs of phishing attempts, such as suspicious links or requests for personal information.
  • Verify Senders: Some email services offer features to verify the identity of the sender. Enable these features to add an extra layer of protection.

Custom Filters and Rules

Creating custom filters and rules can significantly improve your email security:

  • Block Specific Senders: Add known spammers to your block list to prevent their emails from reaching your inbox.
  • Filter Keywords: Create filters based on common spam keywords or phrases. Emails containing these terms can be automatically moved to the spam folder.
  • Whitelist Trusted Contacts: To avoid false positives, add your trusted contacts to a whitelist. Emails from these addresses will always appear in your inbox.

Regular Monitoring

Despite robust filtering, it’s important to regularly check your spam and junk folders. Legitimate emails can sometimes be mistakenly marked as spam. Review these folders periodically to ensure you aren’t missing important communications.

Implementing these email filtering strategies helps maintain a cleaner, safer inbox and reduces the risk of falling victim to email-based cyber threats. By staying vigilant and proactive, you can protect your personal and professional information from malicious attacks.

Rarely Known Tips for Computer Virus Protection

21. Enable BIOS and UEFI Passwords

Setting up passwords for your BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface) is a crucial step in enhancing your computer’s security. This layer of protection is often overlooked, yet it plays a vital role in preventing unauthorized access and changes to your system’s firmware settings. Here’s why it’s important and how to enable it.

Why BIOS and UEFI Passwords Matter

BIOS and UEFI are the firmware interfaces that initialize hardware during the booting process before handing control over to the operating system. If someone gains unauthorized access to these settings, they can alter the boot order, disable hardware components, or even install malicious firmware. Advanced malware can exploit vulnerabilities in BIOS or UEFI, potentially rendering antivirus software and operating system security measures ineffective.

By setting up a BIOS or UEFI password, you add a protective barrier that requires anyone accessing the firmware settings to authenticate themselves. This significantly reduces the risk of unauthorized modifications that could compromise your system’s security.

How to Enable BIOS and UEFI Passwords

  1. Access BIOS/UEFI Settings: Restart your computer and press the designated key (usually F2, F10, Del, or Esc) during the initial boot screen to enter the BIOS or UEFI setup. The exact key varies by manufacturer, so check your computer’s manual or look for on-screen instructions during startup. See detailed instructions on how to access the BIOS.
  2. Navigate to Security Settings: Once in the BIOS or UEFI interface, use the arrow keys to navigate to the “Security” tab. This section may have different names like “Password,” “Security Options,” or “Security Settings” depending on your system.
  3. Set a Supervisor or Admin Password: Look for an option to set a supervisor or admin password. Enter a strong, unique password and confirm it. This password will be required to access and modify BIOS/UEFI settings.
  4. Set a User Password (Optional): Some systems allow you to set an additional user password, which restricts access to the boot process but not the BIOS/UEFI settings. This can add another layer of security if multiple people use your computer.
  5. Save and Exit: After setting the passwords, save your changes and exit the BIOS/UEFI setup. Your computer will reboot, and the new security settings will take effect.

Additional Security Tips

  • Regularly Update Firmware: Manufacturers release firmware updates to fix vulnerabilities. Ensure your BIOS/UEFI firmware is up-to-date.
  • Use Complex Passwords: Choose strong passwords that combine letters, numbers, and symbols to make them harder to guess.
  • Backup Firmware Settings: Keep a record of your firmware settings and passwords in a secure location.

By enabling BIOS and UEFI passwords, you add a robust layer of security that helps protect your computer from unauthorized access and potential malware exploitation, ensuring your system remains safe and secure.

22. Utilize Application Whitelisting

Application whitelisting is a powerful security measure that ensures only pre-approved applications can run on your computer. This technique effectively prevents unauthorized and potentially harmful software from executing, significantly reducing the risk of malware infections.

How Application Whitelisting Works

Application whitelisting operates by maintaining a list of trusted applications that are allowed to run on the system. When you attempt to execute a program, the system checks the whitelist to determine if the application is permitted. If the application is not on the list, it is blocked from running. This proactive approach is more secure than traditional antivirus methods, which rely on detecting and removing known threats.

Benefits of Application Whitelisting

  1. Enhanced Security: By allowing only approved applications, you eliminate the risk of unknown or untrusted software running on your system. This significantly reduces the attack surface for malware and other malicious activities.
  2. Prevent Zero-Day Attacks: Traditional antivirus solutions often struggle with zero-day attacks—new vulnerabilities that have not yet been discovered or patched. Application whitelisting mitigates this risk by blocking all applications not explicitly allowed, including new and unknown threats.
  3. Reduced False Positives: Unlike antivirus programs that can sometimes mistakenly identify legitimate software as malicious (false positives), application whitelisting minimizes these errors by maintaining a curated list of trusted applications.
  4. Control Over Software Environment: Whitelisting gives administrators granular control over the software environment, ensuring that only necessary and trusted applications are installed and run. This helps maintain system stability and performance.

Implementing Application Whitelisting

To effectively implement application whitelisting, follow these steps:

  1. Create a Baseline Inventory: Identify and document all legitimate applications currently in use on your system. This inventory serves as the initial whitelist.
  2. Use Whitelisting Tools: Utilize built-in tools like Windows AppLocker or third-party solutions such as Carbon Black, McAfee Application Control, or Symantec Endpoint Protection. These tools help automate the whitelisting process and provide management features.
  3. Regularly Update the Whitelist: Continuously monitor and update the whitelist to include new legitimate applications and remove obsolete ones. Regular updates ensure that your system remains secure while accommodating necessary software changes.
  4. Monitor and Audit: Regularly audit your system to ensure compliance with the whitelisting policy. Monitoring logs and alerts can help detect and respond to any attempts to run unauthorized applications.

By utilizing application whitelisting, you can create a robust defense against malware and unauthorized software, enhancing the overall security of your computer system.

23. Use Heuristic Analysis

Heuristic analysis is a powerful feature found in many advanced antivirus programs that significantly enhances your computer’s security. Unlike traditional virus detection methods that rely on a database of known virus signatures, heuristic analysis uses behavior-based techniques to identify potential threats. This approach is particularly effective at detecting new, previously unknown viruses that have not yet been cataloged in virus signature databases.

When heuristic analysis is enabled, your antivirus software monitors the behavior of files and programs on your system. It looks for suspicious activities that are characteristic of malware, such as attempts to modify system files, unusual network activity, or efforts to conceal processes. By analyzing these behaviors, the antivirus can flag and isolate files that exhibit potentially harmful actions, even if those files have never been seen before.

For instance, if a file tries to overwrite key system files, launch hidden processes, or make unauthorized changes to the registry, heuristic analysis will detect these actions as suspicious. The antivirus software will then alert you to the potential threat, allowing you to take action before any damage is done. This proactive approach is essential in today’s fast-evolving threat landscape, where new viruses and malware variants appear frequently.

To enable heuristic analysis, open your antivirus software and navigate to the settings menu. Look for an option labeled “Heuristic Analysis,” “Behavioral Detection,” or something similar. Make sure this feature is turned on to benefit from its advanced protective capabilities. Some antivirus programs also allow you to adjust the sensitivity of heuristic analysis, balancing between strict security and minimizing false positives.

Using heuristic analysis not only adds an extra layer of security to your system but also helps in early detection of sophisticated threats that might otherwise slip through traditional defenses. By proactively identifying and neutralizing suspicious behavior, heuristic analysis ensures your computer remains protected against both known and emerging threats.

24. Isolate Potential Threats with a Sandbox

A sandbox is an isolated virtual environment that allows you to run and test untrusted programs without risking the security of your main system. By creating a contained space where applications can operate independently, you can safely analyze their behavior and determine if they contain malware or other malicious elements.

Using a sandbox provides several advantages in protecting your computer from potential threats:

**1. Prevents System Compromise: Since the sandbox is isolated from your main operating system, any malicious activity is contained within the sandbox environment. This means that even if a program is harmful, it cannot affect your primary files or system settings.

**2. Facilitates Safe Testing: Developers and IT professionals frequently use sandboxes to test new software, updates, or untrusted files. This safe testing ground ensures that any bugs or vulnerabilities discovered during testing do not impact the main system.

**3. Enables Behavior Analysis: Running a program in a sandbox allows you to observe its behavior without interference. You can monitor network activity, file changes, and registry modifications to identify any suspicious actions that may indicate malware.

**4. Protects Sensitive Data: By isolating potentially dangerous applications, a sandbox helps protect sensitive data on your main system. Personal information, passwords, and other critical data remain secure, reducing the risk of data breaches.

**5. Supports Multiple Platforms: Sandboxing tools are available for various operating systems, including Windows, macOS, and Linux. Popular sandboxing applications like Sandboxie, VirtualBox, and VMware provide robust solutions for creating isolated environments.

How to Use a Sandbox:

  1. Install a Sandbox Tool: Download and install a sandboxing tool such as Sandboxie, VirtualBox, or VMware.
  2. Create a New Sandbox: Set up a new sandbox environment within the tool. Configure its settings to suit your needs.
  3. Run Untrusted Programs: Launch the suspicious or untrusted program within the sandbox. Monitor its behavior closely.
  4. Analyze Results: After running the program, review the activity logs and determine if any malicious actions were detected.
  5. Delete the Sandbox: Once your analysis is complete, delete the sandbox to remove any potential threats.

By isolating potential threats with a sandbox, you can enhance your computer’s security, protect sensitive data, and confidently test new software without compromising your system.

25. Check for Rootkits

Rootkits are a particularly insidious type of malware designed to hide deep within your computer’s operating system, making them exceptionally difficult to detect and remove. Unlike other forms of malware that might manifest through obvious symptoms like pop-up ads or slow performance, rootkits can operate stealthily, often going unnoticed for extended periods. This stealthy nature allows them to modify core system processes, gain unauthorized access to sensitive information, and even provide remote control to attackers.

To ensure your system is rootkit-free, it’s crucial to use specialized rootkit detection tools. Programs like Kaspersky’s TDSSKiller and Malwarebytes Anti-Rootkit are designed specifically to identify and eliminate these hidden threats. Here’s how you can use these tools effectively:

  1. Download the Tools: Visit the official websites of Kaspersky and Malwarebytes to download TDSSKiller and Anti-Rootkit, respectively. Ensure you’re downloading from a reputable source to avoid further infection.
  2. Run in Safe Mode: Boot your computer in Safe Mode to prevent the rootkit from actively interfering with the detection process. You can do this by restarting your computer and pressing F8 (or the relevant key for your system) before Windows loads.
  3. Perform a Full System Scan: Launch the rootkit detection tools and perform a full system scan. These tools will thoroughly examine your system’s memory, boot sectors, and various files to identify hidden rootkits.
  4. Review and Remove: After the scan, carefully review the results. The tools will typically provide an option to remove any detected rootkits. Follow the on-screen instructions to eliminate the threats.
  5. Restart and Re-scan: After removal, restart your computer and run another scan to ensure that all rootkit remnants are completely eradicated.

Regularly scanning for rootkits is a vital part of maintaining your computer’s security. These malicious programs can be incredibly harmful, but with the right tools and vigilance, you can protect your system from their hidden dangers.

Conclusion

Protecting your computer from viruses and malware requires a combination of common-sense practices and advanced security measures. By following these comprehensive tips, you can significantly reduce the risk of infection and keep your system running smoothly. Stay vigilant, keep your software updated, and regularly back up your data to ensure your computer remains secure. Just remember that preventing a virus is better than a cure.

This is a long article so I have created a PDF file and stored it on Google Drive for you to download.

Please share how you protect your computer from viruses as I know there are many more ways to protect your computer?

25 Comments

  1. michael johnson

    most web sites that contain viruses will have a pop up that will give you an option to click yes or no but both options are yes. just close the browser or hit back as many times as you can. You cannot get infected unless you give the virus an option to be invited into the system, they are like vampires…

    avoid.exe files when downloading something as well unless you know it is from a trusted source.

    Zone Alarm back in the day was a horrible program as lock down included really meant lock down and sometimes the program would freeze all together and block applications when it saw fit to do so…

  2. David Bolick

    Microsoft security is an oxymoron. Use Linux if you are serious about real security.

    • Mitz

      This is probably true David!
      I have some Linux articles coming very soon. Linux is great!

  3. Jarvis Edwards

    Very good tips. With more than 35,000 variants of malware being released daily, it is important to know how to avoid being infected in the first place! Your post basically covers many essentials to preventing infection.

  4. Just to add some more tips. 🙂

    1.) It’s always best to have an integrated browser security software so-to-speak, such as “Spywareblaster,” a totally free browser protection program. It helps to prevent malware from questionable websites (which are listed in the definition updates for the software) installing and infecting a PC.

    2.) Comodo Firewall is an amazing FREE tool. I can’t say too much about it. It can be useful for novices as well as amateurs (using the “Safe Mode” settings) and configured to do some serious blocking, routing, forwarding etc. Worth a try for an additional level of protection!

    3.) Another thing I’d recommend is creating a 2nd user account on any computer running Windows, which is to be used for LIMITED access. In other words, no installing of software without authorization from the administrator. These policies can be set in “gpedit.msc” Unfortunately Windows Vista Home doesn’t provide the gpedit function but other versions as well as Windows 7 does.

    I will add more tips if I think of any…you pretty much covered them Mitz. 🙂

  5. Rahul Root

    The best anti virus for me is norton 360 and comodo firewall.

  6. santosh

    The best anti virus for me is AVAST 6.0 . SUPER as of from 2007 till today i’m not facing any virus effects to my computer

  7. To me what is just as insidious as computer viruses, is all of the malware that is out there.

  8. Mitz

    Yes this would be a big problem as they all see each other as a threat and stuff your system up. Choose one and remove the others.

  9. Sagar

    I am using Eset Smart Security from 2 years and I never faced any problem with viruses since then, also Windows Updates are very important, many ignore these updates but they are very important in safeguarding your system. I recommend installing the latest service pack if you don’t install Windows updates at regular intervals.

  10. Alvin Malmo

    knowledge in computer security, viruses and other computer treats will surely be the basis of one’s happy computing.

  11. Great post! Very important for people who are not aware of the dangers of the internet yet.
    I personally use Comodo internet security (Anti-virus and firewall). I am very happy with it, although I feel like it’s a bit heavier for my computer than eset or kaspersky was but it’s free and it’s still pretty awesome. No problems so far.
    Before this I was using avg for anti virus and pc tools firewall as a firewall but both of them started to look outdated as I never saw them update and the last update dates were long long ago, but when I force them to update they say I have the newest version. So it was time for something else.

    There are a lot of great ones but make sure you don’t decide on the fame or how awesome the website looks. The biggest companies are not necessarily the best.
    Norton for instance is a famous anti-virus and firewall maker, but their software used to be very very heavy. I think these days they have made them lighter but back in the day they were one of the most famous but they were definitely not the best. Lighter and more unknown anti-virus software was catching much more viruses than Norton.

  12. t’s recommended that auto updating of antivirus software to be enabled. Many who got infected by virus were due to not having an updated version of antivrus program. Although auto update will slow the system down a little when it’s updating, it will make sure that you will never forget and missed the update. A good antivirus program is almost certain to be updating everyday to ensure better protection from new security patches.

  13. luke neave

    “Delete the email and send a fresh email to your friend asking them if they actually did send you the email. It is better to be safe than sorry.”

    So your friend then sends an email back saying yes I sent you an email, which you have deleted and now can’t read!

    I think we can reasonably presume your friends would have quite quickly have given up the idea of emailing you. Problem solved!

  14. Richard

    I think the bit about regular updates is essential, as basic as it sounds it’s easier to forget or ignore the notifications and then before you know it you end up with a virus ( happened to me :/ )

  15. Tookata

    If you rely on av software to protect you’re self from malicious code,then good luck.I have not used av for years.
    Common sense with computer knowledge is the key to a clean pc.I do have combo fix and malewarebytes on stand by though.I recommend these to all my clients.

  16. Linto Mathew

    Could you please write a posts comparing all the major antivirus products available ? These days antivirus are a bit cheaper. So I am planning to buy one license for one year. Could you please help me in this task.Its very difficult these days to find a good antivirus comparison.

  17. Hi,
    This article is very informative and I have been following these steps religiously. I recently had a big problem after my PC started crashing as soon as the AVG virus scan and another malware scan (which I purchased) would go on. After tearing my hair out and consulting different web sites for 4 weeks and fearing I had to buy another computer, I finally decided to uninstall AVG (2012 version) as well as the malware scan I bought. Did the trick and I promptly replaced with AVAST which has protected me in the past, no problems. What can I say? Some times you can purchase problems. AVG no more.

  18. zain

    nice, good points mentioned to secure a PC. and one thing more, be careful about plugging USB drives and memory card readers to your computer, they also can bring viruses.

  19. Bill

    As someone else pointed out, its so easy to forget the basics and not update for months! I noticed my last update was 4 months ago.. hmmm!

  20. Mitz

    I agree with you.. Save the hassle and stress and just get protected! 🙂

  21. Andrew

    You need a good antivirus to protect your computer and to be smart about what you do on the internet. I’m using Unthreat Antivirus and I think it does a great job of protecting my computer but I do follow most of the steps above to insure that I don’t get a virus.

  22. Mitz

    Maybe your virus is stopping you from getting protection?

Leave a Reply

Your email address will not be published. Required fields are marked *