Answers to common security questions - Best Practices
Best Practices for Safe Computing - Prevention of Malware Infection
Common sense, good security habits, safe surfing, understanding security and safe computing are essential to protecting yourself from malware infection. No amount of security software is going to defend against today's sophisticated malware writers for those who do not practice these principles and stay informed. Knowledge and the ability to use it is the best defensive tool anyone could have. This includes educating yourself as to the most common ways malware is contracted and spread as well as prevention.
- Simple and easy ways to keep your computer safe and secure on the Internet
- Tips to help protect from infection
No single product is 100% foolproof and can prevent, detect and remove all threats at any given time. This means an anti-virus solution alone is not adequate protection since many types of malware and ransomwares will evade, circumvent and deactivate (disable) your anti-virus and security measures by design. Modern ransomware often involves targeted attacks which makes it less detectable to antivirus and other security software since these threats avoid the usual detection methods. Ransomware developers can evade an antivirus by changing the code, encrypting it or modifying the signature string. Cybercriminals can also use other (multiple) techniques which an antivirus may not protect may not protect against.
- For more details about the limits of an anti-virus, see my comments in this topic (Post #4).
Security is all about layers and not depending on any one solution, technology or approach to protect yourself from cyber-criminals. The most important layer is you...the first and last line of defense.
- Importance of Layered Security in Cyber Defense
- The Importance Of Layered Network Security
- Seven Layers of IT security
- The 7 Layers Of Cybersecurity
- What are the 7 Layers of Security? Understanding the Fundamentals
For example...Mitigating Ransomware attacks requires a multi-layered approach.
Since there's no way to completely protect your organization against malware infection, you should adopt a 'defense-in-depth' approach. This means using layers of defense with several mitigations at each layer...
Mitigating LOLBin-based (Living Off the Land Binaries) attacks requires a multi-layered approach.
LOLBins are native system executables found within operating systems (Windows, macOS, Linux) that can be leveraged for malicious purposes...they typically are used for administrative tasks, system diagnostics, or software installations...Since they are already present on the system and trusted by the operating system, they can often bypass traditional security measures such as antivirus software.
Fact: It has been proven time and again that the user is a more substantial factor (weakest link in the security chain) than the architecture of the operating system or installed protection software.
- Are Humans the Weakest Link in Cyber Security?
- Humans and Cybersecurity— The Weakest Link or the Best Defense
- Why Are Humans The Weakest Link In Cybersecurity?
- Studies prove once again that users are the weakest link in the security chain
Therefore, security begins with personal responsibility which means you need to stay informed of mitigation tactics to protect yourself and/or your organization and keep vigilant of Indicators of Compromise (IOC)...pieces of forensic data, clues or evidence of a compromise and data breach. Since YOU are the first and last line of defense that also means following "best practices" for safe computing.
Tips to protect yourself against malware infection:
Keep Windows updated with all security updates from Microsoft which will patch many of the security holes through which attackers can gain access to your computer. When necessary, Microsoft releases security updates on the second Tuesday of each month and publishes Security update bulletins to announce and describe the update. Using an outdated and unsupported Windows Operating System poses a significant security risk not only for you but for everyone if you still intend on being connected to the Internet.
Unpatched and outdated computers are prone to attack from hackers, botnets, zombie computers and malware infection which can spread to other computers. The majority of computers with outdated operating systems are infected as a result of exploits of one or multiple software vulnerabilities. Cyber-criminals use ransomware, web exploits and exploit kits to spread malware and/or facilitate criminal activity for monetary gain through ransom demands.
- The Dangers of Using Windows 10 After its End of Support Date
- Risks of Using Outdated Operating System
- The Curse of Old Equipment: Why Your Outdated Tech Could Be a Gateway for Cyber Villains
- 5 Cyber Risks Associated with Outdated Software
"One of the most concerning aspects of running an unsupported operating system is the rise of no-click, drive-by attacks. In these attacks, you don’t even need to interact with anything on a website or in an email to become infected."
Keep your Web Browser updated as well. Regardless of which browser you use, vendor's routinely release updates which include fixes for exploits and vulnerabilities. Internet Explorer will no longer be supported after June 15th, 2022...it is being retired in favor of Microsoft Edge. Going forward, folks should avoid using Internet Explorer if it is still on your operating system...consider it a security risk.
Avoid keygens, cracked software, warez and any pirated software. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, ransomware, remote attacks, exposure of personal information, and identity theft. In some instances an infection may cause so much damage to your system that recovery is not always possible and the only option is to wipe your drive, reformat and reinstall the OS.
- For a more detailed explanation, see my comments in Keygens, Cracks, Warez, Pirated Software are a Security Risk (Post #11).
Avoid peer-to-peer (P2P) file sharing programs (e.g. Limewire, eMule, Kontiki, BitTorrent, BitComet, uTorrent, BitLord, BearShare). They too are a security risk (unsafe practice) which can make your computer susceptible to malware infections. File sharing networks are thoroughly infested with malware according to security firm Norman ASA and many are unsafe to visit or use. Malicious worms, backdoor Trojans, IRCBots, Botnets, and rootkits spread across P2P file sharing networks, gaming, and underground sites. Users visiting such sites may encounter innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads (malvertising) that install viruses, Trojans, and other malware.
Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. If you must use file sharing, scan your downloads with anti-virus software before opening them and ensure Windows is configured to show file known extensions.
- For a more detailed explanation, see my comments in Torrents and File Sharing (P2P) are a Security Risk (Post #11).
Avoid Bundled software and the use of Registry Cleaners.. Many toolbars, add-ons/plug-ins, browser extensions, screensavers and useless or junk programs like registry cleaners, optimizers, download managers come bundled with other software (often without the knowledge or consent of the user). Bundled software, toolbars and browser extensions and can be the source of various issues to include Adware, pop-up ads and browser hijacking which may change your home page/search engine, and cause user profile corruption. As such, bundled software may be detected and removed by security scanners as a Potentially Unwanted Program (PUP), a very broad threat category which can encompass any number of different programs to include those which are benign as well as problematic.
Since the downloading of bundled software sometimes occurs without your knowledge, folks are often left asking themselves "how did this get on my computer." Even if advised of a toolbar or Add-on, many folks do not know that it may be optional and not necessary to install in order to operate the program. If you install bundled software too fast, you most likely will miss the "opt out" option and end up with software you do not want or need. The best practice is to take your time during installation of any program and read everything before clicking that "Install" or "Next" button. Even then, in some cases, this opting out does not always work as intended.
- For a more detailed explanation, see my comments in Why you should not use Registry Cleaners and Optimization Tools (Post #7).
Beware of Rogue Security software and Crypto malware (ransomware) as they are some of the most common sources of malware infection. They spread malware via a variety of attack vectors...through social engineering (trickery) and user interaction, opening a malicious or spam email attachment, executing a malicious file, exploits, exploit kits, web exploits, malspam, malvertising campaigns, cryptojacking malware campaigns, fileless malware, non-malware attack, posing as a folder on removable drives, drive-by downloads, downloading software cracks, pirated software, fake Microsoft Teams updates, fake/illegal activators for Windows & Office, targeting managed service providers (MSPs) and RDP bruteforce attacks, a common attack vector for servers particularly by those involved with the development and spread of ransomware since if enabled, it allows connections from the outside as explained here.
For more detailed information about ransomware and the most effective strategy to protect yourself from ransomware (crypto malware) infection, see my comments in Post #14 and Post #15 which also includes links to the Latest Ransomware Threat Updates.
- See my comments in a Brief History of Ransomware - Types of Operating systems affected (Post #19) for detailed information on how ransomware has evolved.
Keeping Autorun enabled on flash drives is a significant security risk as they are one of the most common infection vectors for malware which can transfer the infection to your computer. One in every eight malware attacks occurs via a USB device. Many security experts recommend you disable Autorun as a method of prevention.
- Don't Plug It In! How to Prevent a USB Attack
- 29 Different Types of USB Attacks
- USB drive malware attacks spiking again in first half of 2023
Always update vulnerable software like browsers, Adobe Reader and Java Runtime Environment (JRE) with the latest security patches. Older versions of these and several other popular programs have vulnerabilities that malicious sites can use to exploit and infect your system.
- Kaspersky Lab report: Evaluating the threat level of software vulnerabilities
- The Continuing Threat of Unpatched Security Vulnerabilities
- Adobe warns of critical Acrobat and Reader zero-day exploited in attacks
- Kaspersky Lab report: Java under attack — the evolution of exploits
- Microsoft: Unprecedented Wave of Java Exploitation
- Why Browser Vulnerabilities Are a Serious Threat
To help prevent this, you may want to install and use a Software Updater to detect vulnerable and out-dated programs/plug-ins which expose your computer to malware infection.
Use strong secure passwords and change them anytime you encounter a malware infection or have been hacked especially if the computer was used for online banking, paying bills, has credit card information or other sensitive data on it. This would include any used for taxes, email, eBay, paypal and other online activities. You should consider them to be compromised and change all passwords immediately as a precaution in case an attacker was able to steal your information. According to Schneier on Security
The efficiency of password cracking depends on two largely independent things: power and efficiency.
- Power is simply computing power. As computers have become faster, they’re able to test more passwords per second; one program advertises eight million per second. These crackers might run for days, on many machines simultaneously. For a high-profile police case, they might run for months.
- Efficiency is the ability to guess passwords cleverly. It doesn’t make sense to run through every eight-letter combination from “aaaaaaaa” to “zzzzzzzz” in order. That’s 200 billion possible passwords, most of them very unlikely. Password crackers try the most common passwords first.
Most security experts would say that a mixture of random uppercase, lowercase letters, numbers and special characters...combined with length (a password’s resilience increases exponentially with its length) is the most secure against a hacker's attempt to crack. If that's too much effort, just use a Random Password Generator which is mathematically more secure anyway. If a web site or APP offers Multi-factor authentication (MFA) or two-factor authentication (2FA) you should seriously consider using it as an extra layer of security.
- Password Security Best Practices: An In-Depth Guide
- How to Create a Strong Password (and Remember It)
- Four Methods to Create a Secure Password You'll Actually Remember
- How to Implement a Strong Password Policy. Best Practices and Mistakes to avoid
Many of the newer types of malware are designed to steal passwords and logins to banks, credit cards, board forums and similar other sensitive web sites before encrypting data. Attackers can use ransomware to download a password-stealer component to harvests all usable usernames and passwords from an infected system and send that information to its Command and Control (C&C) server. The Qilin ransomware group uses a tactic that deploys a custom stealer to steal account credentials stored in Google Chrome browser. FTCODE Ransomware has the ability to steal passwords from popular browsers such as Firefox, Chrome, Explorer and Microsoft Outlook.
Once the attacker gains administrative access remotely to a target computer they can create new user accounts or use a user not logged in to do just about anything including the ability to reset the passwords of other administrators'.
- Account Manipulation and Access Token Theft Attacks
- What is Privilege Escalation?
- How do attackers use privilege escalation to escalate their access from a user to an admin?
- Privilege Escalation Tactics and Techniques
Always use a different password for each web site you log in to. Never use the same password on different sites and change your password if you think it may have been compromised.
- When Should You Change Your Password?
- How Often Should You Change My Password?
- Pasword Monster: How Secure Is My Password?
- Security.org: How Secure Is My Password?
You should not allow your browsers to remember passwords. Why?...they are tied to browser security and not as secure as dedicated password managers.
- Is It Safe to Let Your Browser Remember Passwords?
- Why You Shouldn’t Use Your Web Browser’s Password Manager
- Don’t Use Your Browser’s Password Manager—Here’s Why
If you’re going to use your browser’s password vault, the best practice is use a master password on it.
Passkeys are a replacement for passwords which allow you to can sign into your Microsoft personal account or work/school account much faster using your face, fingerprint or PIN. Since passkeys are unique to each website or application you don't have to worry about someone else using your passkey to access them. Passkeys are also resistant to and helps protect against phishing attacks, making them a much more secure option. Microsoft has long been a proponent of passwordless authentication (passkeys) for years and other industries are moving in that direction too.
- Microsoft introduces passkeys for consumer account
- Passkeys overview
- Passkeys FAQs
- WebAuthn APIs for passwordless authentication on Windows
- Creating and Signing in with a passkey
Strong passwords, passkeys, multi-factor authentication (MFA) and two-factor authentication (2FA) are the new norm in today's world due to the number of data breaches where large amounts of personal information (including usernames and passwords) is stolen by criminals and published for sale on the Internet. We as users of this technology must take steps to minimize the risk of all sorts of threats (account compromise, identity theft), not just Microsoft sign-in attempts. You can also create a new alias (nickname or moniker) to disguise yourself with a new identify while using your primary account which can further minimize the risk against hackers.
Know how to recognize Phony Email/Phishing Scams and do not open unsolicited email attachments as they can be dangerous and result in serious malware infection. For example, Zbot/Z-bot (Zeus) is typically installed through opening disguised malicious email attachments which appear to be legitimate correspondence from reputable companies such as banks and Internet providers or UPS or FedEx with tracking numbers.
- Using Caution with Email Attachments
- How to Avoid Getting a Virus Through Email
- Safety tips for handling email attachments
Learn about Tech Support Scamming through unsolicited phone calls, browser pop-ups and emails from "so-called Support Techs" advising "your computer is locked or infected with malware". Learn about Ranscam (fake ransomware scamming) where criminals use various scare tactics and threats to coerce victims into to paying a ransom demand. Learn how to recognize Extortion/Sextortion Scamming, a tactic involving phishing emails / email spoofing sent to unsuspecting victims where criminals make various threats with demands for money in exchange to keep sensitive information they allegedly claim to have collected about you from being published or sent to family, friends, coworkers, social media contacts.
- For more specific information about these types of scams, please read this topic (Post #13)
Allow Windows to show file extensions. Malware can disguise itself by hiding the file extension or by adding double file extensions and/or extra space(s) in the file's name to hide the real extension so be sure you look closely at the full file name as well as the extension. In some cases, you may not see the double extension because file extensions are hidden by default in Windows so they appear normal.
If you cannot see the file extension, you may need to reconfigure Windows to show known file name extensions.
- 50+ File Extensions That Are Potentially Dangerous on Windows
- How Hackers Can Disguise Malicious Programs With Fake File Extensions
- Why you should set your folder options to “show known file types”
Even if you have chosen the option to unhide file extensions, you still may be fooled if the malware writer named the file with extra spaces before the ".exe" extension. The real extension is hidden because the column width is too narrow to reveal the complete name and the tiny dots in between are nearly invisible.
One Final Very Import Tip !!! Always back up your important data and files on a regular basis...keeping a separate, offline (isolated) backup to a device that is not always connected to the network or home computer. Backing up data is an essential part of building a strong cybersecurity strategy with layered protection against malware infection. If your system becomes compromised or infected, some malware may render your computer unbootable during or before the disinfection process. Ransomware can encrypt or destroy all your important data, especially when dealing with Wiper/Eraser Ransomware...see Section 4 in Post #14 for more information about Wipers.
The only reliable way to effectively protect your data and limit the loss with this type of infection is to have an effective backup plan.
- The smartest way to stay unaffected by ransomware? Backup!
- 3-2-1 Backup Strategy
- The Backup Rule of Three
Even if you're computer is not infected, backing up is also part of best practices in the event of hardware or system failure related to other causes. Backing up data and disk imaging are among the most important prevention tasks users should perform on a regular basis, yet it's one of the most neglected areas.
IMPORTANT!!! When implementing a backup strategy include testing to ensure it works before an emergency arises; routinely check to verify backups are being made and stored properly; and isolate all backups (offline) to a device that is not always connected to the network or home computer so they are unreachable. If not, you risk not only malware infection but ransomware encrypting your backups and any backups of the backups when it strikes. In addition to encrypting data, many ransomware developers are now routinely searching for and destroying backups or simply deleting your backups.
- I explain in more detail the importance of a backup strategy as it relates to rapid response and recovery from ransomware in Section 4 of the Most Effective Strategy Against Ransomware - Preventing Ransomware (Post #14).
For the average home user, it is simpler to just buy an external hard drive, copy your critical data to it, disconnect the device and store it in a safe/secure location rather than try to monitor and maintain a complex backup system. Program like SoftByte Labs Comparator make doing backups easy for home users as well as professionals before creating an image.
It is a good practice to make a disk image with an imaging tool (e.g. Acronis True Image, Drive Image, Ghost, Macrium Reflect, etc.). Disk Imaging allows you to take a complete snapshot (image) of your hard disk which can be used for system recovery in case of a hard disk disaster or malware resistant to disinfection. The image is an exact, byte-by-byte copy of an entire hard drive (partition or logical disk) which can be used to restore your system at a later time to the exact same state the system was when you imaged the disk or partition. Essentially, it will restore the computer to the state it was in when the image was made.
Some imaging/backup software (e.g. Macrium Image Guardian, Acronis Active Protection/Acronis True Image) automatically restore and/or prevent targeted backup files from being encrypted by ransomware but you must pay for this protection.
Backing up Data & System Imaging Resources:
- What’s the Best Way to Back Up My Computer?
- How to Protect Your Backups From Ransomware
- Backup and Restore in Windows 10/11
- How to Back Up and Restore Your Files in Windows 11 using External Drive
- How to Restore Backup Files from External Hard Drive
- How to Make System Image Backups on Windows 11
How to use File History in Windows:
- How to Set Up and Use File History Backup on Windows 11
- How to use File History in Windows 10 and 11
- How to Perform a Backup Using File History in Windows 11 or Windows 10
Other topics discussed in this thread:
- All about PINs, Passkeys & Security Keys and Microsoft Authenticator Mobile APP
- Choosing an Anti-Virus Program
- Why should you use Antivirus software? - Safe Steps for Replacing your Anti-virus
- Do I need antivirus software on my smartphone - Smart Phone Best Practices
- Supplementing your Anti-Virus Program with Anti-Malware Tools
- Microsoft Defender Antivirus/Offline Scan Stops (freezes, hangs)...fails to complete
- Microsoft Security products indicates detected files during scan but does not show anything after completion
- Choosing a Firewall
- Understanding virus names and Naming Standards - Malware Naming Conventions
- Glossary of Malware Related Terms
- Why you should not use Registry Cleaners and Optimization Tools
- I have been hacked...What should I do? - How Do I Handle Identify Theft, Scams and Internet Fraud
- What is a Potentially Unwanted Program (PUP) or Potentially Unwanted Application (PUA)?
- About those Toolbars and Add-ons which change your browser settings
- Push Notifications: A Growing Threat to Browsers & Mobile Devices
- Keygens, Cracks, Warez, Pirated Software, Torrents and File Sharing (P2P) are a Security Risk
- What are Cookies and are they dangerous?
- Beware of Phony Emails, Phone Calls, Tech Support Scams, Ranscams & Extortion/Sextortion Scams
- Reporting Fraud, Phishing, Extortion, Phone and Tech Support Scams <- scroll down
- There are no guarantees or shortcuts when it comes to malware removal - When should I reformat?
Ransomware Related Topics:
- Most Effective Strategy Against Ransomware - Prevention (Mitigation)
- Ransomware: How it Works - Stages of Encryption
- Ransomware Encryption: The math, time and energy to brute-force an encryption key
- Decryption vs Data Recovery of Ransomware
- Should you pay the ransom? - Reporting Ransomware & Scams
- Submitting Ransomware/Malware Samples
- Brief History of Ransomware - Types of Operating systems affected
- Release History of Master Keys / Decryptors for some major ransomwares
Section 2 in How Malware & Ransomware Spreads explains the most common methods malware and ransomware is typically delivered and spread.
Another topic to read if you are having problems with computer slowness, unresponsiveness, unwanted software, startup and browser or extension issues is Slow Computer/Browser? Check here first; it may not be malware.
In case you are asking for assistance, please read Who is helping me with Ransomware/Malware Infection? (Post #3).
Scammers have become so prolific that the site owner of Bleeping Computer has had to make this public announcement.
Authors Note: Some of the information in these topics is redundant but folks just viewing a single topic or two may not have read any of the others so I don't want them to miss out. The redundancy also reinforces the importance of the information provided in certain topics. I take advantage of using hyperlinks whenever possible as it allows me to keep what I have written more concise since the hyperlink in most cases provides much more detailed information. The hyperlinks also serve as source materials since the information they contain is written by other experts in the field of security.
My thanks to Grinler (Lawrence Abrams), the site owner of Bleeping Computer who has been like a mentor since I joined BC. I also want to thank the forum staff, and the many malware removal/security experts I have learned from and worked with over the years...too many to name individually but many I now consider colleagues and friends. Without all of them I could not have written these topics to share with others.
Updated: 12/15/25
Edited by quietman7, 15 December 2025 - 05:09 PM.



This topic is locked
Back to top











