212.997.0600

Tips for protecting your PCs from Malware and Viruses

 

 

 

 

It has become essential to take measures to protect your business PCs from numerous threats encountered these days. Threats to your business and business productivity are more pervasive than ever. Hackers use various techniques that make Malware protection extremely difficult.

1. Use Endpoint Protection:  Use antivirus software from a reputable company.  Also, make sure that Endpoint protection you are using has Malware protection and Spyware protection built in.  As long as you have a valid subscription, your antivirus will automatically update from the Internet. Most Virus Protection companies push updates several times a day. Malware on the Internet entices users to download free Security software, so make sure that you are downloading  Security software from a reputable company and not some malware that poses itself as Security software. If you are not sure you should discuss this with your IT department or someone knowledgeable.

2. Keep your Operating Systems up to date: Operating System vulnerabilities are released on a regular basis and most are addressed through regular updates. You should regularly check for updates for your operating systems. At work check with your techs to see how they handle this. Most IT departments use Management software to push Operating system updates to all the computers.

3. Remove all Unnecessary software: Remove software that is unnecessary or not needed. This will reduce the attack surface, this is extremely important on servers. Make sure you backup any data before removing any programs.

4. Backup your data: Make sure you have current backup all the time. In case you were attacked by a virus, or your system crashed or a piece of hardware in your computer failed, you will have a backup to revert to.

5. Be very Wary of Unexpected Emails and Attachments:  Be very very wary of emails from people you know and you don’t know. If you receive an email from someone you don’t know, especially if it is sent to a group of people, immediately delete it. If the email is coming from a source you do know but it is unexpected and has attachment and or links that you don’t recognize or are not expecting, more than likely that person’s email account has been compromised and the hacker is trying to spread the attack to you, as your contact was in the person’s email account.

6. Don’t click on Internet Links you don’t recognize:  Web links can connect you to websites and webpages that may be hosting malicious software which will infect your system without your knowledge. Only click on links from a source you know and trust. The easiest way to find out whether a link may be illegitimate is to hover your mouse over the link to see where it is taking you. Most email programs offer a preview of the actual link when you hover over.

7. Passwords: Enable passwords and use strong passwords. Do not use same passwords for all the services that you use. If you use different passwords for different services at least not all your accounts will get compromised if a hacker was to get hold of one of your passwords.

8. Keep Applications Updated: All PCs have software such as Java, Flash, Adobe Reader installed these days. These software are essential to carry out transactions and activities on the Internet. There have been known vulnerabilities in these software. Keeping these applications up-to-date is essential and will protect you from many vulnerabilities.

DDKinfotech specializes in Managed Services. Our Managed Services lets you focus on growing your business, instead of worrying about IT. Our Managed Service Offering comes with Antivirus, Spyware, Malware protection, OS Patch Management, 3rd Party Patch Management, Asset Management and system monitoring. Also, included is our secure remote access to your office desktop.

Contact Us to schedule no obligation, free Assessment, Click here

 

 

 

Related Posts

A case for Email Archiving – Why your Emails Need Protection and Preservation-Today

Why Email Archiving is Important 1. Protecting IP Businesses today of all sizes need the value of their intellectual property to be maintained in perpetuity. They want to assure that their repository is 100% accurate, even if an employee accidentally or deliberately deletes their email. 2. eDiscovery Many government agencies and regulations require certain stringent levels of security, permanence and auditability for business email. This includes FRCP, SEC, GLBA, HIPAA, HITECH, SOX, and more.

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Copyright © 2016 DDKinfotech - All Rights Reserved
Top