What is one way to protect against a security threat to a computer system?

Computer security threats are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.

Examples of Online Cybersecurity Threats

Computer Viruses

Perhaps the most well-known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process. 

Carefully evaluating free software, downloads from peer-to-peer file sharing sites, and emails from unknown senders are crucial to avoiding viruses. Most web browsers today have security settings which can be ramped up for optimum defense against online threats. But, as we'll say again and again in this post, the single most-effective way of fending off viruses is up-to-date antivirus software from a reputable provider. 

Learn more about how to combat computer virus threats and stay safe online. 

Spyware Threats

A serious computer security threat, spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information. We’ve amassed a wealth of knowledge that will help you combat spyware threats and stay safe online.

While many users won't want to hear it, reading terms and conditions is a good way to build an understanding of how your activity is tracked online. And of course, if a company you don't recognize is advertising for a deal that seems too good to be true, be sure you have an internet security solution in place and click with caution.

We’ve amassed a wealth of knowledge that will help you combat spyware threats- learn more about the dangers of spyware and stay safer online

Hackers and Predators

People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism. These online predators can compromise credit card information, lock you out of your data, and steal your identity. As you may have guessed, online security tools with identity theft protection are one of the most effective ways to protect yourself from this brand of cybercriminal.

What scams are hackers using lately? Learn more about the dangers of hacking how to combat protect yourself against dangerous malware attacks online.

Phishing

Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. Phishing attacks are some of the most successful methods for cybercriminals looking to pull off a data breach. Antivirus solutions with identity theft protection can be "taught" to recognize phishing threats in fractions of a second. 

How can you tell the difference between a legitimate message and a phishing scam? Educate yourself on the latest tricks and scams.

Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information. Here are some ways you can help reduce your online risk when you use your computer at home.

What is one way to protect against a security threat to a computer system?

Tips to protect your computer

  • Use a firewall
    Windows has a firewall already built in and automatically turned on.

  • Keep all software up to date
    Make sure to turn on automatic updates in Windows Update to keep Windows, Microsoft Office, and other Microsoft applications up to date. Turn on automatic updates for non-Microsoft software as well, especially browsers, Adobe Acrobat Reader, and other apps you regularly use.

  • Use antivirus software and keep it current
    If you run Windows you have Windows Security or Windows Defender Security Center already installed on your device. 
     

    Tip: If you're a Microsoft 365 Family or Personal subscriber, you get Microsoft Defender included with your subscription at no extra charge. It helps protect all your devices - Windows, Mac, Android, and iOS. For more information see Getting started with Microsoft Defender.

  • Make sure your passwords are well-chosen and protected
    To learn how, see Protect your passwords.

  • Don’t open suspicious attachments or click unusual links in messages.
    They can appear in email, tweets, posts, online ads, messages, or attachments, and sometimes disguise themselves as known and trusted sources.

  • Browse the web safely
    Avoid visiting sites that offer potentially illicit content. Many of these sites install malware on the fly or offer downloads that contain malware. Use a modern browser like Microsoft Edge, which can help block malicious websites and prevent malicious code from running on your computer.

  • Stay away from pirated material
    Avoid streaming or downloading movies, music, books, or applications that do not come from trusted sources. They may contain malware.

  • Don't use USBs or other external devices unless you own them
    To avoid infection by malware and viruses, ensure that all external devices either belong to you or come from a reliable source.

Protect your personal information online

Your privacy on the internet depends on your ability to control both the amount of personal information that you provide and who has access to that information. Find out how to protect your privacy on the internet.

Protect yourself from scams

When you read email, use social media, or browse the web, you should be wary of scams that try to steal your personal information (also known as identity theft), your money, or both. Many of these scams are known as "phishing scams" because they "fish" for your information. Find out how to protect yourself from phishing scams and avoid tech support scams.

Prevent and remove malware

One important step toward greater workplace security is to protect your computer against malware.

Windows Security

Windows Security (or Windows Defender Security Center in Windows 8 or early versions of Windows 10) is built in to Windows and provides real-time malware detection, prevention, and removal with cloud-delivered protection. It is intended for home, small business, and enterprise customers. For more info, see Help protect my computer with Windows Security.

Other ways to remove malware

To assist all Windows customers, including those who are not running Windows Security, Microsoft provides Microsoft Defender Offline.

Microsoft Defender Offline

Microsoft Defender Offline runs outside of Windows to remove rootkits and other threats that hide from the Windows operating system. This tool uses a small, separate operating environment, where evasive threats are unable to hide from antimalware scanners.

With Windows 10 and 11, Microsoft Defender Offline is built in to the operating system and can run from Windows Security. It is provided as a separate download for previous versions of Windows.

What are 3 ways to protect your computer?

Tips to protect your computer.
Use a firewall. ... .
Keep all software up to date. ... .
Use antivirus software and keep it current. ... .
Make sure your passwords are well-chosen and protected. ... .
Don't open suspicious attachments or click unusual links in messages. ... .
Browse the web safely. ... .
Stay away from pirated material..

How will you protect and secure system from security attacks?

Follow these tips to protect your devices and safeguard your sensitive data:.
Use a firewall. ... .
Install antivirus software. ... .
Install an anti-spyware package. ... .
Use complex passwords. ... .
Keep your OS, apps and browser up-to-date. ... .
Ignore spam. ... .
Back up your computer. ... .
Shut it down..

What is the protection of computer system?

Computer security, also called cybersecurity, is the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms.