This tutorial is part of our tutorial series on WordPress Security. In this tutorial, we provide a number of software security tips to help tighten your WordPress security and overall web security.
Please also review our WordPress Security Guide For Beginners and our free WordPress Security Checklist.
Below are some important tips and useful information to keep in mind regarding keeping your computer protected from malware attacks.
Running more than one antivirus program at the same time can potentially cause conflicts that affect PC performance. Don’t run more than one antivirus program at the same time. You will cancel out the protection afforded by these programs.
For the most part, your antivirus software can only protect your computer from known threats.
New malware and new viruses (i.e. unknown threats) are continually being developed and regularly unleashed on online users by hackers and malicious users.
Much like scientists working on developing medical vaccines, when antivirus companies discover, are notified and/or get hold of new harmful scripts and viruses, they work on quickly developing a way to protect your computer from being infected by these newly detected threats, and release the new protection methods as updated “definitions”.
Some companies release new definitions for their software on a weekly basis. It’s really important, therefore, to keep your antivirus software definitions regularly updated. Fortunately, most software programs let you set your computer to receive automatic antivirus definition updates.
If you have your computer turned off for a long time, make sure that one of the first things you do when you go back online is to update your definitions.
Just as we recommend keeping your antivirus definitions updated, it’s also a good idea to perform full system scans of your computer on a regular basis, including email scans. Once again, most security software programs let you set up automated scans.
Downloading files and software from unsecured and untrustworthy sites is one of the main ways computers get infected with malware. Sites can be very appealing, and entice users with “free” downloads, such as games, videos, screensavers, ringtones, cheats, money-making “secrets”, and even free WordPress plugins and themes.
If in doubt about the trustworthiness of a website, look for the following signs:
Many antivirus and antispyware programs offer the option of installing a toolbar on your browser with security features as an additional line of defense …
Many security toolbars include features that block pop-ups, spam, and known phishing sites. Some can even detect potential consumer scams and warn you when you visit a suspicious site.
While we recommend using a firewall, the main purpose of a firewall is to stop other people from breaking into your system or computer network remotely. A firewall can’t stop malware from infecting your computer if you have allowed it to come in (e.g. by opening up a malicious attachment, or downloading infected files to your hard drive.
Many Internet Service Providers (ISP) and free email providers offer some form of antivirus protection at the server level. While it’s great to have this added layer of protection, server-level antivirus programs can’t protect your computer from getting infected by malware downloaded from infected or malicious websites.
It’s a good idea to create user accounts separate from the default administrator account, especially if you work from home, and other members of your family access your computer. By keeping admin and user accounts separate, you only need to log in as the administrator when changes to the computer are required. This minimizes the frequency of accessing the admin account, which limits opportunities or hacking.
You may also want to create an individual user account for each member of your family who uses the computer. This will allow each person to keep his or her information private.
Sharing files can allow a hacker to look at information stored on your computer or plant a virus to infect your computer. Learn about the risks of file sharing, and learn how to disable file sharing on your operating system to prevent these risks. If a file sharing program is installed on your computer, be sure that it does not run automatically when you boot up your computer.
Programs that you no longer use are usually not updated and may not have the security patches that could stop a hacker from accessing your computer. Back them up to an external drive and then delete/uninstall these programs from your machine.
Before installing any downloaded software, review the End-User License Agreement (EULA). This is the legal contract between a software application author or publisher and the user of that application. Many free downloads come with spyware and other programs that you would not want installed on your computer. By reading the software agreement carefully, you will be able to find out if the software you are installing comes with any “hidden” extras.
Pirated software is illegal, and sites that distribute illegal software are often loaded with malware. Unlicensed software can also be susceptible to viruses and incompatible with updates and patches designed to fix vulnerabilities in the software. Some unlicensed software copies may even come with viruses pre-installed.
If you find a USB drive that does not belong to you, do not plug it into your computer, as it may be a trap for unsuspecting users to test their curiosity and could deliberately contain viruses. Treat it like any lost public property and hand it over to an authority or to the police.
If you suspect that malware is affecting your computer, stop any online activities that involve usernames, passwords, or other personal information immediately. Scan your computer with an antivirus software and delete anything that the program finds to be suspicious. If the problem is not resolved call for professional technical help from a computer security services company, repair shop, or your computer manufacturer.
If despite all of your efforts to keep your computer secure, you end up discovering that your computer has become badly infected, you may end up having no choice but to perform a complete reinstall of your computer operating system and restore your data from a previous backup. This is why it’s so important to have a computer backup system in place before disaster strikes.
To learn more about creating a computer backup system, see the tutorial below:
Congratulations! Now you know how to protect your computer from malicious software and software-based security threats.
"I have used the tutorials to teach all of my clients and it has probably never been so easy for everyone to learn WordPress ... Now I don't need to buy all these very expensive video courses that often don't deliver what they promise." - Stefan Wendt, Internet Marketing Success Group