5 Simple Tips: How To Protect Computer From Virus Attacks, Malware And Botnets: In 10 Quick steps!

how to protect your computer from virus attacks picture
Junior Teixeira


A Known Fact: Strong passwords protects you from: Brute-force, numeric and dictionary attacks.
Quick Tip: Combine letters, numbers, special characters, symbols (minimum 10 - maximum 15). Change them from time-to-time.
Hackers first hacks your psychological habits. Before they actual use technology against you. They know consumers are either too busy, or too lazy.
Even the Most Secured WPA2 gets cracked; under the right circumstances. There are many WAYS to crack weak passwords. Examples such as exhaustive network searches, brute-force attacks, port scanners, etc.

WPA and WPA2 Encryption methods are replacements of WEP. Today's world believes that WPA, WPA2, Windows 10, Linux or UNIX, etc. Are the Most Secure Products.
I'm here to tell You That! No Matter How Secure Technology.may seem; at first. Cybercrime is the same like Crime; in general! It Cannot BE Stopped, it Can only BE Managed!

Ultimately: The Consumer, or User. Will Always Be either The Strength or Weakness! You Choose! The Bottom line:Security and cryptography are NOT Good Enough By itself. Even if it was possible to. Totally eliminate loop-holes; in all direction. The "Individual's Behavior" will Always Be "The Unpredictable Wild Card."

5th Step:Protect Your Operating Systems, Portable, or Mobile Devices! Most of the latest Criminals tricks, or Malware attacks. Are Focused around Capturing your Laptop, and portable gadgets (physically or virtually).
These DEVICES are Compact, convenient and proactively involved in your daily activities. We save so much: Private, Propriety or Sensitive information; on smartphones, USB flash drives, laptops AND tablets.
As previously mention: Use them as temporary storage equipment; till you Get to the Office or Home. Then transfer the data - to your Permanent Storage Device. Remember to delete it from the portable gadget.
Bear in Mind - That mobile device ARE vulnerable to: Theft, Loss, Viruses and Hackers:
  • Download Phone Application from trusted sources; like iStore, Amazon App Store, Android and so on.
  • Buy Flash Drives with onboard security, Keep Firmware or Operating Systems of your Smartphones and Tablets updated.
  • This Should also Be Practiced on your Windows 10 or earlier versions, Linux, UNIX, Mac, laptops, or Desktops.

How To Protect Your Windows Computer From Worms, Ransomware And Badware?


The Vulnerabilities of Windows 10: Think of Windows 10, Linux and all the Most Secured OS; as live systems. Microsoft of or the respected OS designers. Keeps monitoring their internet traffic. For suspicious activities, malware behaviors, or new threats as they emerge.
In response:

They Send regular updates and security patches. To keep the Operating System updated and abreast of the latest cybercrime developments.
So, By Turning Automatic updates off. You might be thinking you're saving on databundle consumption rates. But you're risking a GREAT Deal.
Turn on You PCs automatic updates, to prevent Most of the potential risks, that may stem from the older version.

6th Step: Don't use Public internet, Wi-Fi, "Hot Spots", Other People Computers or Home networks for online transactions, accessing your cloud, or private online activities.
Scan your own, or other people USB flash drives for malware.
Before you insert them in your Laptop, PC, or Desktop. Cybercriminals likes to install spyware/Trojans/Malware on USB's. Learn more here: AboutUSB Flash Drive Attacks!

How to Protect Windows 10 from Virus Attacks?


7th Step: Protect Your Computer From Malware: By installing A full version Antivirus Program. Choose A one stop solution for: Antivirus, Anti-Spyware, Anti-ransomware and Malware Scanners.
Avira Logo
The Most Secure WiFi Routers comes with first tier: built-in Firewalls, WPA2, and first layer of cyber protection.
Some Top Router Brands, even block spyware or fake websites. But you really need to Get Down and dirty.

Back it up with a more Sophisticated Model. Bear in mind: Cyber security Companies like Avast, Panda, Heimdal, Or Avira. Specializes in internet security only. And that Makes them better Equipped, Well-versed and Specialist:
Use anti-virus or malware software that regularly updates. Avast for example monitors behavior, new developments and threats. They actually send them to their lab for further investigation, analysis and understanding.
Uses that knowledge to improve and stay ahead of viruses. As they flood into the market. This is why they ARE one of the Oldest Kids Around the block, and remain one of the Most Credible Companies out there!
The Best Alternatives Are: Panda, Heimdal and Avira. Known for their Superb abilities to Detect, Remove and Block malware attacks.

8th Step:Don't Open Emails From Strangers! Spam is a high risk. There are two types of Trojan horses; namely Server and Client. Don't let the smart words scare you!
What it simply means is that One is distributed online (from a website). While the other is sent to your Email. The latter happens to be most Common.
It may appear like a legit email. Examples such as: "Security Alert", or "Suspicious Activities Detected On Your Online Bank", or Something even more enticing.
The main objective is to get you to Open the email and Attachment. Which will automatically install the Trojans.
It's very difficult to detect which emails is legit/NOT. Again you need technology to prekvent cybercrime!
Fortunately you get Avast Antivirus that prevents Trojans, Ransomware, Worms, Botnets and more.

9th Step: Protect your online identity. Phishing threats are one of the oldest. Yet! The most Notorious even in this day and Age.
And Guess What? Yup! You're so right! Its main purpose is to fish personal information out of you. Be very careful who you give your personal to.
Examples Such as: Your names, ID numbers, address, phone number, PIN, or financial information. Be it on the phone, social media or internet.
Make sure that websites are secure for online purchases. Use a Secure Browser like Google Chrome, Internet Explorer 9, Firefox, etc. Or any reputable browser that has Privacy settings.

10th Step: Be careful when accessing website links, or some websites online. There are Spoof websites online claiming to be Well-known websites.

They may Generously offer you "Free Online Advertising Vouchers." I came across one, but when I wanted to visit other pages it turned out to be a static single page. Surprisingly! It's only functional on the personal details part.
This not only limited to that, they may even Claim to be a job portal, training resource or Go as far a posting an Ad. This is the place where "human TRAFFICKING" are borne.

Always think before you click on a link, from unknown origins. And if you know the name, visit other pages to see if it is real. Criminals don't have time to create Authority websites, on Trade Mark names.
Don't even Give too much information to people you know! I once help a client who got scammed for a family member.
Have you ever heard of 'Spear Phishing Threats? Instead of random attacks on internet users that they Don't know (known as Phishing).
Spear Phishing - Is more directed to a specific person, group of CONSUMERS, or business. You can imagine in this Case the person may know your Worth, Status, Or Financial Value.
In Conclusion:Windows 10, Samsung SSD, Linux, UNIX or Several Layer Encryption will Always have a Weakness!
Which happens to be the user. Yup! The user is always the Wild-Card! Do you need more Convincing:

First Example: If the User Turn Off Auto Updates On Windows 10. Hoping to Cut cost on databundle Consumption. The Operating System becomes more vulnerable.
Second Example:If the User Create Dictionary name, numerical order, or weak passwords for WPA2. The several layer protect becomes useless.
Third Example:Linux Operating System are the Most Secured. Viruses needs a root access, which is through the administrator.

This can happen if the attackers targets the administrator directly. Or indirectly through a basic account, that sends the malware to the root. As a result Linux are Becoming more vulnerable than ever before.
Why? Because a system as secured as you make it. Apart from that you have to walk on eggs, curb your online habits, or ultimately Educate yourself on the latest Cyber THREATS and ways to protect your computer network from them