One answer is… – Never turn your computer on!
However, we know that that defeats the object of owning a computer, like “never drive your car to avoid an accident”.
Your car has security. A key to open it and start it, an alarm and immobilser, seatbelts, a front and rear bumper, airbags, proximity sensors etc. You would avoid driving your car into mud, thick sand or into a disreputable area.
Similar appropriate measures are necessary for a computer.
Your computer is a modern day tool for many things which includes finding information, keeping records, productivity, keeping in touch and being able to shop.
Keep your computer protected by observing the following:
- Lock-Up. When left unattended the computer should be locked away – be it in a building, a room or a cupboard.
- Log-In password. Use a Log-In Password/ Pin-Code to log into the computer.
You could also add extra security and set up a password in the computer BIOS which locks the hard disk drive and requires unlocking password immediately at boot up.
- AntiVirus. Install good (paid for) Security Software on your computer. I recommend ESET Smart Security. Windows Defender, is already included with Windows 10 computers (also Windows 7, 8 and 8.1), but it has limitations. Other security software disables this software when installed.
- Bogus Phone calls. Anyone calling you on your phone about your computer should be rejected immediately. Unless a piece of monitoring software is already installed on your computer by someone you know, it is impossible for anyone else to detect issues with your computer.
- Phishing. You may get emails with a web site link or you may land on a web site which requires you to provide sensitive information. NEVER fill in a form on a web site unless you have checked the web site address to one which you know and sure of.
- Bogus animations. You may land on a web site with an animation of a scan displaying numerous virus issues. This is NOT your computer, it is simply a scaremongering animation designed to alarm you to take further action. Close the website tab or application immediately.
- Emails with attachments. Spam email can have an attachment which contains a virus. Unless you have pre-arranged to receive that email and attachment, do not open the attachment. If you cannot verify with the sender of the email, delete it immediately.
- Software and applications. Most viruses and hacks come in the form of software which you have been coaxed to install. This software can include: Registry cleaning, Driver maintenance, Defragging, Web Browser toolbars, bogus Security or Antivirus software, Audio and Video Codecs or Pirated software. (Pirated software is software which is a copy of the original but key generated to avoid having to enter a product unlock key. Hackers often inject virus software into these programs.)
- PUPS (Potentially Unwanted Programs). This is software, usually free and useful, but has other software bundled into it and installs onto your computer without your permission.
Good Antivirus software will detect and ban dodgy emails, software and websites before the worst happens.