Nosotros told you how to tell if you're infected with malware. We told you how to make clean up the infection if you were affected. But how about we prevent malware infection from happening in the outset place!

Yes, it's possible to clean upward an infected computer and fully remove malware from your organization. Merely the damage from some forms of malware, like ransomware, cannot exist undone. If they've encrypted your files and you lot haven't backed them up, the jig is upwards. So your best defense is to beat the bad guys at their own game.

While no single method is always 100 percent fool-proof, at that place are some tried and true cybersecurity techniques for keeping malware infections at bay that, if put into practice, volition shield you from nearly of the garbage of the Internet.

Without further ado:

Protect vulnerabilities

1 of the most ingenious delivery methods for malware today is by exploit kit. Exploit kits are sneaky little suckers that rummage around in your computer and wait for weaknesses in the system, whether that'south an unprotected operating organisation, a software program that hasn't been updated in months, or a browser whose security protocols aren't up to snuff (we're looking at y'all, Internet Explorer).

Here are some ways you tin can protect confronting exploits and shield your vulnerabilities:

  1. Update your operating system, browsers, and plugins. If there'south an update to your reckoner waiting in queue, don't allow it linger. Updates to operating systems, browsers, and plugins are often released to patch any security vulnerabilities discovered. And then while you lot leave those programs alone, cybercriminals can notice their way in through the vulnerabilities.Bonus mobile phone tip: To protect against security flaws in mobile phones, be sure your mobile phone software is updated regularly. Don't ignore those "New software update" popular-ups, even if your storage is full or your battery is depression.
  1. Enable click-to-play plugins. One of the more devious means that exploit kits (EKs) are delivered to your computer is through malvertising, or malicious ads. You needn't even click on the advertizement to go infected, and these malicious ads can live on prestigious, well-known sites. Besides keeping your software patched so that exploit kits tin can't do their dirty work, you can help to block the exploit from ever being delivered by enabling click-to-play plugins.Click-to-play plugins keep Flash or Java from running unless y'all specifically tell them to (by clicking on the advertizing). The bulk of malvertising relies on exploiting these plugins, and so enabling this characteristic in your browser settings will assistance continue the EKs at bay.
  1. Remove software you lot don't use (particularly legacy programs). Then, yous're notwithstanding running Windows XP or Windows 7/8.1? Microsoft discontinued releasing software patches for Windows XP in 2015, and Windows 7 and viii are only under extended support. Using them without support or the ability to patch will get out you lot wide open to exploit attacks. Take a look at other legacy apps on your estimator, such as Adobe Reader or older versions of media players. If you're not using them, best to remove.

Lookout man out for social engineering

Another elevation method for infection is to scam users through social technology. Whether that's an email that looks like information technology's coming from your depository financial institution, a tech support scam, or a fishy social media campaign, cybercriminals have gotten rather deft at tricking fifty-fifty tech-savvy surfers. Past being aware of the post-obit top tactics, you can fend off uninvited malware guests:

  1. Read emails with an eagle eye. Phishing is a cybercrime mainstay, and it's successful just when readers don't pay attention or know what to look for. Check the sender'south address. Is it from the actual company he or she claims? Hover over links provided in the body of the email. Is the URL legit? Read the language of the email carefully. Are in that location weird line breaks? Awkwardly-constructed sentences that audio foreign? And finally, know the typical methods of communication for important organizations. For instance, the IRS volition never contact you via electronic mail. When in doubt, call your healthcare, depository financial institution, or other potentially-spoofed organization directly.Bonus mobile phone tip: Cybercriminals love spoofing banks via SMS/text message or fake depository financial institution apps. Do not confirm personal data via text, specially social security numbers. Once more, when in uncertainty, contact your bank directly.
  2. Do not call fake tech support numbers. Ahhh, tech support scams. The bane of our existence. These often involve pop-ups from imitation companies offering to help you with a malware infection. How do you lot know if they're fake? A real security company would never market to you via pop-upward saying they believe your computer is infected. They would especially non serve up a (bogus) 1-800 number and charge money to fix it. If you have security software that detects malware, it will show such a detection in your browse, and it will not encourage yous to phone call and beat out out coin to remove the infection. That'southward a scam trying to infect you. Don't take the allurement.
  3. Exercise non believe the cold callers. On the flip side, there are those who may pick upward the phone and try to baffle you the proficient onetime-fashioned mode. Tech support scammers love to call up and pretend to be from Microsoft. They've detected an infection, they say. Don't believe it. Others may claim to accept constitute credit card fraud or a loan overdue. Ask questions if something feels sketchy. Does the person accept info on y'all that seems outdated, such every bit old addresses or maiden names? Don't confirm or update the info provided by these callers. Ask about where that person is calling from, if you can think, and then hang up and check in with credit agencies, loan companies, and banks direct to exist sure there isn't a problem.Bonus mobile phone tip:You lot can block calls until pigs wing, just there will always exist a scammer ready with a new number (especially 1 that looks similar in surface area code and first iii digits to yours). Many cybersecurity programs for Android and iPhone can put the bulk of those calls to residuum, meaning an unidentified number needn't stress you lot out as much. Of course, when in doubt, screen your calls.

Practice rubber browsing

There'south such a thing equally adept Internet hygiene. These are the things you lot should be doing to protect confronting external and internal threats, whether you've lost your device and demand to remember it or want to stay protected when you shop online.

"While many of the threats you hear nearly on the news go far seem like there is no mode to protect yourself online these days, the reality is that by post-obit some basic tips and maintaining good habits while online, yous will evade infection from over 95 percent of the attacks targeting you," says Adam Kujawa, Caput of Intelligence for Malwarebytes. "For that last 5 per centum, read articles, keep up with what the actual security people are saying, and follow their communication to protect yourself."

And so here are some of the basics to follow:

  1. Use potent passwords and/or countersign managers. A strong countersign is unique, is not written downward anywhere, is inverse often, and isn't tied to easily found personal information, similar a birthday. Information technology's also not repeated for different logins. Admittedly, that's a tough cookie to chew on. If yous don't want to worry about remembering 5,462 different rotating passwords, you may want to look into a password director, which collects, remembers, and encrypts passwords for your figurer.
  2. Make sure you lot're on a secure connection. Look for the proper padlock icon to the left of the URL. If it'south in that location, and so that ways the information passed between a website'south server and your browser remains individual. In addition, the URL should read "https" and non just "http."
  3. Log out of websites afterward you're done. Did you log into your healthcare provider's site using your super-strong password? Yous could nonetheless exist leaving yourself vulnerable if you lot don't log out, peculiarly if you're using a public calculator. Information technology's not enough to just shut the browser tab or window. A person with plenty technical prowess could admission login information from session cookies and sign into a site as you lot.

Layer your security

All the safe browsing and careful vigilance in the globe tin't protect you from all the threats out there. Sometimes yous need a professional person to catch the poo that cybermonkeys are flinging. Then to proceed your machine clean, invest in security software and layer information technology upwards with the following:

  1. Use firewall, anti-malware, anti-ransomware, and anti-exploit applied science. Your firewall can detect and block some of the known bad guys. Meanwhile, Malwarebytes products employ multiple layers of tech to fend off sophisticated attacks from unknown agents, stopping malware and ransomware infection in existent time and shielding vulnerable programs from exploit assault.

Security professionals concur a multi-layer approach—using non but multiple layers of security engineering but also user awareness—helps keep you protected from the bad guys and your ain mistakes. Now get along and fight malware!