![most important ways to protect your computer from viruses most important ways to protect your computer from viruses](https://www.chicagoitsolutions.com/files/2018/01/hacking-2964100_960_720.jpg)
- #MOST IMPORTANT WAYS TO PROTECT YOUR COMPUTER FROM VIRUSES INSTALL#
- #MOST IMPORTANT WAYS TO PROTECT YOUR COMPUTER FROM VIRUSES VERIFICATION#
- #MOST IMPORTANT WAYS TO PROTECT YOUR COMPUTER FROM VIRUSES SOFTWARE#
- #MOST IMPORTANT WAYS TO PROTECT YOUR COMPUTER FROM VIRUSES DOWNLOAD#
![most important ways to protect your computer from viruses most important ways to protect your computer from viruses](https://www.pandasecurity.com/en/mediacenter/src/uploads/2014/09/pandasecurity-4-steps-to-avoid-virus.jpg)
#MOST IMPORTANT WAYS TO PROTECT YOUR COMPUTER FROM VIRUSES SOFTWARE#
To open an attachment, first save it to your computer and then scan it with your antivirus software check the software's help documentation for instructions. Unknown people, or with a strange subject line: Never open an attachment you weren't expecting, and if you do not know the sender of an attachment, delete the message without reading it. If the site doesn't have a green padlock in the URL field ( ), the connection is not secure and you should not log in. Inspect sites that ask for your username and passphrase: All sites requiring you to log in (at IU and elsewhere) should encrypt data being transmitted between your device and the site.For further important information about links in email, see Avoid phishing scams. If you doubt its validity, ask for more information from the sender.
![most important ways to protect your computer from viruses most important ways to protect your computer from viruses](https://cmitsolutions.com/tribeca/wp-content/uploads/sites/17/wordpress-popular-posts/3603-featured-500x300.jpg)
To avoid viruses spread via email or instant messaging (IM), think before you click if you receive a message out of the blue, with nothing more than a link and/or general text, do not click it. Do not click random links: Do not click any link that you can't verify.See Know if someone outside the US has logged into your IU account. Sign up for foreign login alerts: If your account is compromised by an attacker who logs in from overseas, IU can alert you via email.If you get a Two-Step Login (Duo) request that you didn't initiate.Get started with Two-Step Login (Duo) at IU.
#MOST IMPORTANT WAYS TO PROTECT YOUR COMPUTER FROM VIRUSES VERIFICATION#
Combining an additional verification with your username and passphrase helps prevent anyone but you from logging in.
#MOST IMPORTANT WAYS TO PROTECT YOUR COMPUTER FROM VIRUSES INSTALL#
Install and maintain recommended security software.Īt Indiana University, official communication (including email messages, phone calls, or computer support consultations) will never include a request for your IU passphrase. When you do need to perform tasks as an administrator, always follow secure procedures. Simply visiting an unfamiliar internet site with these high-privilege accounts can cause extreme damage to your computer, such as reformatting your hard drive, deleting all your files, and creating a new user account with administrative access. Running your computer as an administrator (or as a Power User in Windows) leaves your computer vulnerable to security risks and exploits. Do not log into a computer with administrator rights unless you must do so to perform specific tasks. Practice the principle of least privilege. Practice the principle of least privilege (PoLP) Refer to your operating system's help for assistance. Keep your software updated by applying the latest service packs and patches. The most important thing you can do to keep your computer safe is to use a secure, supported operating system see ComputerGuide: Deals by vendor, recommendations, and common questions. Top four things you can do to protect your computer Maintain current software and updates If your computer or local network is managed by a computer support provider, you should consult with your provider before making changes to avoid disrupting your network connection. Information Security Best Practices contains more technical security precautions that you should know, and that IT Pros should implement.Īll information in this document applies to laptops for further details, see Laptop and Mobile Device Security.įollowing some of the suggestions below can affect how your computer interacts with the network. These instructions describe best practices for securing your computer, accounts, and the data stored on them. Deploy encryption whenever it is available.Remove unnecessary programs or services from your computer.Shut down laboratory or test computers after you are finished with them.Log out of or lock your computer when stepping away, even for a moment.Do not propagate virus hoaxes or chain mail.
#MOST IMPORTANT WAYS TO PROTECT YOUR COMPUTER FROM VIRUSES DOWNLOAD#