Recent cyberattacks on mega-corporations have highlighted the need for stronger protection against cyber threats. Hacking a personal or ordinary business is relatively easier, so we need to know all we can about cybersecurity.
Secure your PC with these pro tips from cybersecurity experts.
“First, consider using a computer that restricts what software can be used or requires an App Store. Apple Iphones and iPads are good examples of this. Apple laptops running OS-X and Windows 10 operations systems that only run software from known sources can limit unauthorized software.” (Ron Gula)
“Second, for the general public, I like to tell them to reboot their computer daily if not weekly. This is sort of like wearing masks to prevent COVID - very basic guidance. Rebooting a computer purges memory where malware may be living and gives operating systems a chance to patch themselves. A more sophisticated recommendation is to tell people to patch their computers and realize that all of their applications have their own update cycles.” (Ron Gula)
“And lastly, everyone should store their files in a place they can be retrieved with strong authentication. This could be a Google or OneDrive share, Dropbox, Box.net, .etc. You should be able to get all of your data off of your computer and need a very good password and a second form of authentication, preferably a rotating authentication code.”
Ron Gula, Gula Tech Adventures
“The best way to prevent virus attacks on computers is to install antivirus software, available for Macs, PCs, and Linux computers. Antivirus software scans computers for viruses, malware, ransomware, adware, spyware, and other cyber attacks. If it finds anything malicious, it will quarantine it in a sandbox where it cannot harm the rest of the computer. Then, it will get rid of the virus.
“Look for programs that scan for suspicious behaviors rather than just malicious signatures. This means that the software can find malware that’s not already in its database. These days, most antivirus software scans for suspicious behaviors as well as signatures.”
Aliza Vigderman is Senior Editor and Industry Analyst of the digital security website Security.org
“Do not open your spam folder, and do not ever click on anything there. These days, just by clicking on a link, you might get infected with something.” (Ezio Razzi)
“Do not download anything, unless you are certain of the source. Files “.exe” are the obvious ones to never download, they’re executable and probably malware, but there are many less-obvious ones, hackers can get access to your computer even with excel files (by asking you to activate the macros).” (Ezio Razzi)
“Be careful with phishing emails. If you receive an email from a friend or coworker, and you feel something about that person is out of character, like asking you to open a link, or a file, or getting some info, don’t do it. Trust your gut, their account might be compromised.” (Ezio Razzi)
“Update browser and apps, constantly, to avoid zero-day malware (recently created malware that has not yet been reported to an antivirus database).Adjust your configuration so that the operating system automatically updates, that way you don’t have to do it manually.”
Ezio Razzi, Network Security Consultant
“Email is one of the earliest methods of infection, and one that made computer viruses famous in the early days of the internet. Some people spread infections to their friends without even realizing it. Once the account has been compromised, the attackers will utilize it to transmit malicious information to the full address book list. When opening an email attachment or clicking on a link, the most dependable approach to ensure your safety is to scan it with anti-virus software.
“Virus protection should be included in your email provider's or email provider's email service. Attachments are automatically checked for malware in Gmail, for example. If the email contains a virus, it will be rejected and you will be alerted.”
Alex Claro, VPN Analyst Credit Donkey
“Although anti-virus is crucial and you should invest in a strong solution, viruses can still slip through the cracks and be downloaded to your machine. It can often be found lurking in your network, undetected by you. A weekly malware check should be performed to ensure that infections do not spread further through your network and that the damage is minimized.
“Many of these tools are simple, inexpensive, or even free, and they can be used in conjunction with a backup to ensure that no dangerous files are backed up alongside your other files.”
Rameez Usmani, Tech and Security Expert at the Code Signing Store
“Right today, there are over a trillion web pages on the internet. We spend a lot of time on the internet, doing research, buying, interacting, and so on. It all entails going to numerous websites. While various standards have been developed to ensure that you are at the very least informed when you are about to enter an insecure and potentially harmful website, cyber thieves have discovered ways to circumvent these standards and appear to be legitimate sites.
“It's not always feasible to tell if a website contains dangerous content immediately. But the devil is in the details. Make a note of the website's URL and check official sources to see if the website is legitimate and exactly what it appears to be. The lock icon next to a URL, while obvious, is one of the first signals that you're on a potentially dangerous website.”
Edward Mellett, Founder/Co-Founder WikiJob.co.uk
“DNS is an internet system that converts website URLs to their IP addresses so a user doesn't have to memorize IP addresses (quite thankfully). These services collect large amounts of data and can quickly determine when websites are serving up malware. A user who has this service in place and attempts to navigate to a malicious website would be blocked by this service.” (Dr. Brian Scavotto)
There are several flavors of these available on every browser. Some examples of these can be found here, but this is not a comprehensive list. (Dr. Brian Scavotto)
“For the tech savvy, using a Linux-based virtual machine for high-risk browsing is a great idea. Not only is the Linux operating system much lower on the risk spectrum for infection, it's also running in a virtual machine which protects your host machine from threats.” (Dr. Brian Scavotto)
“A large percentage of malware is delivered via phishing attempts either in an attempt to get a user to click a link or open an attachment. Becoming very familiar with the tell-tale signs of phishing and how to spot them can make a huge impact.” (Dr. Brian Scavotto)
“As mentioned in #4, phishing is very high on the list of ways to introduce malware into a system. Using an email security gateway as an extra hop to filter and analyze email messages before they reach your inbox is a great idea. There are consumer-grade options along with enterprise-grade options, many of which are fully cloud based software-as-a-service offerings.” (Dr. Brian Scavotto)
“No matter how much technology you throw at a problem, sometimes it all fails and you get infected. Backing up your data to a safe third party location could be a key ace in the hole on recovering.”
Dr. Brian Scavotto CISSP, Cybersecurity Consultant, Proprietor Cornerstone Cybersecurity, LLC
“Although the cracked software can save a lot of money for you, it may contain viruses that can easily infect your computer and ruin the data in it. Some of them can also cause issues to your computer, such as hard-to-detect bugs. So, never use cracked software to protect your computer.” (Eric Sander)
“UAC is a Windows fundamental security component, which can be used to mitigate the effect of viruses. When malware makes some changes that need administrator-level permission, the UAC will show up and give you options to approve or refuse the changes. I would highly recommend everyone to turn on the UAC on their computer.”
Eric Sander, Founder at iActivation