Anti-this, Anti-that – How do I stay protected?

 In Security

Seems like every day you hear or read about another Virus or computer hack to worry about.  As technology grows, your knowledge of how to protect yourself increases.  With so many options out there, how do you know which software  “Anti” is best for you?

 

  1. Anti-Virus
    An anti-virus guards your computer against infection by checking activity on your computer against a database of ‘known suspicious activity’. Anti-virus software will also attempts to “seek” and “destroy” the source of malicious activity.
  2. Anti-Malware
    Malicious software, also known as malware includes trojans, viruses, spyware and other software designed to cause your computer to malfunction or destroy your data.
  3. Anti-Spyware
    Spyware is a type of malware that can secretly steal files and record the activity of an infected computer. Spyware can be used to gather information used to access password protected accounts or view a listing of visited websites.
  4. Anti-Phishing
    “Phishing” is internet fraud in which a criminal poses as a trustworthy source and tries to trick you into divulging sensitive information. Anti-Phishing software will work with your web browser and email client software to identify and block these attempts.
  5. Anti-Trojan
    Anti-Trojan software performs an integrity check on programs you install on your computer. It identifies and isolates software that may be performing a sneaky activity.
  6. Anti-Worm
    Worms are a type of malware infection that spreads by duplicating itself across networks and onto infected hard drives. A worm can cause your computer to run slow or even crash by using up all available hard disk space.
  7. Anti-Rootkit
    A “rootkit” is a software infection that can blends into your operating system and replaces your critical files with corrupt and malicious versions. Anti-rootkit software helps detect, prevent the installation of, and remove certain rootkit infections.
  8. Browser Exploits
    Browser exploits is a form of malicious code that takes advantage of a vulnerability or flaw in your system. ‘Click jacking’ may embed code on a web page that virtually ‘steals’ your click and applies it toward an action you never intended.
  9. Secure Network
    Hackers run automated programs on computers around the world trying to locate any vulnerable computers connected to Internet. A network type set up can be a potential vulnerability for any device that uses one to connect to the Internet. Software with features designed to secure your network works to close unnecessarily open ports to your computer and monitor activity between the programs on your computer and the Internet.
  10. Email Protection
    Antivirus software that includes Email Protection features has the ability to scan inbound and outbound email for infected attachments and URLs to malicious websites. Inclusion of quarantine and blocking features is an added plus.

 

 

Recommended Posts