IS USING INTERNET SAFE?

While it is not possible for any antivirus to completely eliminate the risk caused by infiltrations and attacks, it is possible to significantly minimize the risk of infection by following certain and simple strategies. Applying them, along with the protection you expect from your antivirus software, security product, will help keep your information safe. In the event that you are found to be infected with a malicious program (malware) and your security product is unable to remove the infected files.
Keep your virus signature
database up to date. Antivirus company’s lab specialists analyze internet
threats around the clock and prepare and release updates in order to
continually improve the level of protection for users of our solutions. By
default, your security product updates the virus signature database every hour.
These updates allow the rapid detection of new threats and keep your computer
properly protected.
Verify that your product updates correctly
If you use a dial-up internet
connection, and want to have automatic updates run only when the internet
connection is established.
Use a Firewall. Protegent 360 antivirus
software includes a personal firewall to protect your incoming and outgoing
connections.
Keep real-time file system protection turned on
By default, real-time file
system protection provides seamless scanning of all types of media. The files
are scanned immediately after each update of the virus signature database. If
you disable real-time file system protection, the icon next to the system clock
will turn red, notifying that maximum protection is not ensured. You can
activate it from the main program window by clicking the red Protection status
icon in the upper right corner of the window and clicking Enable real-time file
system protection.
Know what your protected status means
The antivirus software icon will
be green as long as maximum protection is ensured.
Perform regular scans on your computer
In addition to the real-time
file system protection that your antivirus product
offers, running a scan is an essential part of your security routine,
particularly if you are a high-risk user or suspect that your computer is
infected. A scan of your computer will detect threats that were present prior
to the installation of your security product, latent potentially dangerous
files that were not detected prior to a virus signature database update and
infections that may have occurred while real-time file system protection was
disabled.
Practice Safe Web Browsing
Restrict access to suspicious websites.
Restricting access to suspicious sites is particularly useful when there are
multiple users accessing the Internet on your computer. The Antivirus and
Antispyware allow you to block certain websites or entire domains.
Choose strong passwords.
Keep your password safe.
Do not give your password to
anyone or write it in an easily accessible place.
Beware of phishing and spam.
Do not open emails from unknown
senders. Please scan all attachments before opening or downloading them. Do not
provide important information through unsolicited emails (or by phone) without
first verifying that the sender is trustworthy. Legitimate financial
institutions will not ask you for sensitive account information via email,
particularly if it was not requested. You may send us emails that you suspect
were designed to steal personal information as well as phishing sites.
Use a pop-up blocker. Although
not all pop-ups are malicious, some may be part of a phishing attempt or a
gateway for downloading viruses. Clicking the pop-up window to close it could
install a threat. You can close the popup by pressing Alt + F4 on your keyboard
or using the Task Manager.
Microsoft Internet Explorer
Mozilla Firefox
Be careful with attachments
and downloads. Do not open emails with attachments from unknown users, or from
known users if you were not expecting emails from them. Make sure to analyze
all attachments before downloading them.
Teach children to use the Internet safely.
If you have children, talk to
them about safe Internet surfing practices. You can also use the links above to
restrict access to suspicious websites.
Keep Your Computer Protected
Back up your important information.
Infection with malware usually
leads to complete failure of the operating system and damage to important
information. It is important that you back up your important and sensitive
information to an external drive such as a DVD or hard drive. Such precautions
will facilitate the recovery of that data in the event of a system failure.
Do not change the default settings unless you are an
experienced user.
Know the consequences of
changing settings before altering them. Changing certain system settings could
expose your computer to additional risks and should not be done unless you are
informed of the potential repercussions.
Download the security patches.
Software companies are on the
lookout for new vulnerabilities in their applications and regularly release
security updates to eliminate potential threats. It is important to download
them the moment they are available.
One of the best ways to avoid
being a victim of attacks is to learn more about the methods used by the
malware writer. The more you know, the less likely you are to be a victim of
such an attack.
Comments
Post a Comment