Use a third-party firewall product or turn on the Microsoft Windows Internet Connection Firewall.
Updates help protect your PC from viruses, worms, and other threats as they are discovered. It is important to install updates for all the software that is installed on your PC. These are usually available from vendor websites.
You can find the latest updates on the website of the company that made your software. You can find a list of links to popular software on our updates page.
You can easily keep all of your Microsoft software up-to-date by turning on Windowsautomatic updates. Your PC will then automatically download Microsoft security updates when it is online.
Starting with Windows Vista and Windows 7, Microsoft introduced User Account Control (UAC), which, when enabled, allowed users to run with least user privileges. This scenario limits the possibility of attacks by malware and other threats that require administrative privileges to run.
You can configure UAC in your computer to meet your preferences:
Most scanning and removal software can detect and prevent the installation of known malicious software and unwanted software such as adware or spyware. You should frequently run a scanning and removal tool, such as Microsoft Security Essentials, or Windows Defender in Windows 8, that is updated with the latest signature files.
Exercise caution when dealing with email, IM conversations, and web messages received from unknown sources, or received unexpectedly from known sources. Use extreme caution when accepting file transfers from known or unknown sources.
Exercise caution with links to webpages that you receive from unknown sources, especially if the links are to a webpage that you are not familiar with. Malicious software may be installed in your computer simply by visiting a webpage with harmful content.
Threats may also be bundled with software and files that are available for download on various torrent sites. Downloading "cracked" or "pirated" software from these sites carries not only the risk of being infected with malware, but is also illegal.
While attackers may attempt to exploit vulnerabilities in hardware or software to compromise a computer, they also attempt to exploit vulnerabilities in human behavior to do the same. When an attacker attempts to take advantage of human behavior to persuade the affected user to perform an action of the attacker's choice, it is known as 'social engineering'. Essentially, social engineering is an attack against the human interface of the targeted computer.
Attackers may try to gain access to your Windows account by guessing your password. It is therefore important that you use a strong password – one that cannot be easily guessed by an attacker. A strong password is one that has at least eight characters and combines letters, numbers, and symbols.
I want to...