Microsoft Malware Protection Center – Help prevent malware infection on your computer

trojanHelp prevent malware infection on your PC

Malware authors are always looking for new ways to infect your PC. Following the simple tips below can help you stay protected.

Limit user privileges

Many malware threats need full access to your PC to run properly. Windows 8.1, Windows 7, and Windows Vista use User Account Control to limit what a program can do without your permission.

This means you will be notified if any software or application tries to make any changes to your system. It can also help stop malware and unwanted software from installing themselves or changing the way your PC works.

There is more information about User Account Control at the following links:

Up-to-date security software is the best way to help protect your PC from malware.

Microsoft provides security software that is regularly updated to protect against the latest threats. Our software includes:

Whatever security software you choose, make sure you update it regularly. We recommend you update your security software at least every day.

Get the latest software updates

New malware is written every day. Many of these threats target vulnerabilities in your PC software. Software companies regularly release updates that fix these vulnerabilities.

To help stay protected you should regularly update all your software. This includes programs like Java, Adobe and QuickTime. Go to our software updates page for more information.

You can easily keep all of your Microsoft software up-to-date by turning on Windows automatic updates. Your computer will automatically download Microsoft security updates when your computer is online.

Understand how malware works

Malware authors use several common tricks to install their malicious software on your PC. Understanding the most common ways they do this can help you stay protected.

  • Email – Malware often arrives on your PC in an email attachment. You should never open an attachment from someone you don’t know or if an email looks suspicious. Instant messages and requests for file transfers can also spread malware.
  • Websites – Never open links to webpages that you don’t recognize or that are sent from people you don’t know. Malicious websites can install malware on your PC when you visit them.

Use caution – If you view a website that doesn’t look quite right, or unexpected things happen when you visit, close your browser, download the latest updates for your security software and run a quick scan on your PC.

  • Pirated software – Malware is often bundled together with pirated software. When you install the pirated software you may also install malware. You can find more information on the Protect your PC from pirated software
  • Social engineering – Malware authors often try and trick you into doing what they want. This can be clicking or opening a file because it looks legitimate, paying money to unlock your PC or visiting a malicious webpage. These deceptive appeals are known as social engineering.
  • Passwords – Attackers may try to guess your Windowsaccount or other passwords. This is why you should always use a password that can’t be guessed easily. A strong password has at least eight characters and includes letters, numbers, and symbols. There is more information on theCreate strong passwords
  • USB flash drives and other removable drives – Some types of malware, such as worms, can spread by copying themselves to any USB flash drives or other removable drives that are connected to your computer. Always be careful when sharing removable drives, and make sure you scan them. We have instructions on how to scan USB flash drives on our help page.

Turn on your firewall

A firewall is a set of rules that chooses which information can access your PC. It can help prevent malware infections by stopping suspicious programs from getting onto your PC, or accessing the internet once installed.

You can find out how to turn on your firewall at the links below:

Via. http://www.microsoft.com/security/portal/mmpc/shared/prevention.aspx

Advertisements

About steventorresramos

I have over (24) years of Computer Aided Drafting & Design experience and over (16) years of IT experience. After graduating high school I attended a Technical College and earned an Associate Degree in Drafting & Design. I then enrolled at the University of Puerto Rico where I earned an A.S. in Civil Engineering Technologies. While attending the Univ. of Puerto Rico I worked as a freelance Drafter for a variety of architects and engineers. During my senior year I began to work for the firm Planning Management & Development in Ponce, Puerto Rico. Two years later I was offered the position at Mario Corsino & Associates, which later became InterGroup a medium size Civil Engineering, Architectural and Planning firm in Bayamon, Puerto Rico. At InterGroup I became assistant chief drafter where I was responsible for 20+ drafters & civil techs, and this is also where I began my IT training. In 2000 I decided to move to St. Petersburg, FL where I was hired as CAD Manager at Advanced Engineering & Design a small Civil Engineering firm established in 1998. Currently still employed by Advanced Engineering & Design I’m now the CAD/IT Manager. I have also continued to expand my knowledge base in both the IT & CADD fields through continued training, certifications, and attending Autodesk University. I’m currently an Autodesk Certified Professional proficient in AutoCAD, Civil 3D and various other Autodesk products. I have been the President of the Tampa Bay Autodesk Users Group (TBAUG) since late 2007 and a member of Autodesk Users Group International (AUGI) since 1996. I have an A.S. Degree in Computer Networking , a Bachelors of Applied Science in Technology Management and currently finishing work on my Masters in Computer Information Systems. I’m a licensed drafter in the US Commonwealth of Puerto Rico, and a Microsoft Certified Professional. I hold certificates as a Microsoft Certified IT Professional: Server Administrator, Cisco Networking Associate Professional and Linux Administrator.
This entry was posted in Tech, tips. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s