1. Beware of fake download buttons
These can turn up anywhere, but generally we’ll find them on download sites. We can guarantee there will be a download button that isn’t the one you want to click. The result can be that you downloaded something you don’t want possibly malware, although often simply bad software.
2. Use a secure browser
An old copy of Internet Explorer is just not good enough these days. An old version of any browser cannot be considered secure. These apps are updated regularly by their developers for many reasons, mostly to maintain and improve security. Online shopping, online banking, social networking they all have their risks, and the last thing we want it a browser harboring some dangerous software that records our keystrokes or hijacks a secure link to your bank account.
3. Download from trusted sources
Before downloading an app, conduct research to make sure the app is trusted. This includes checking reviews, confirming the legitimacy of the app store and comparing the app sponsor’s official website with the app store link to confirm consistency. Many apps from untrusted sources contain malware that once installed can steal information, install viruses, and cause harm to our phone’s contents.
4. Understand app permissions before accepting them
We should be cautious about granting applications access to personal information on our phone or otherwise letting the application have access to perform functions on our phone. Make sure to also check the privacy settings for each app before installing.
5. Avoid public torrent sites
We may not realise this, but there are two types of torrent sites: public and private. While both can be accessed through a browser, the latter usually requires us to create an account and manage our ratio. The idea here is that we upload as much (or more) than we download, or else be banned from the site. Private trackers can be difficult to join, as they don’t often accept new account registrations.
6. Report stolen phones
If our phone is stolen, we should report the theft to our local law enforcement authorities and then register the stolen phone with our wireless provider. This provides notice to all the major wireless service providers that the phone has been stolen and will allow for remote “bricking” of the phone so that it cannot be activated on any wireless network without our permission.
7. Delete media files requiring fake codecs
Media from torrent sites can often be fake, and we probably won’t know until it has downloaded. Usually a video file these fakes can be difficult to detect until they’re run. At this point, our media player will display a message advising that the file cannot play or requires a specific player. So, did you download a genuine movie? The way to find out is to try and play it in the popular player. With every current video and audio codecs built in, if the file won’t play with this, it’s not a genuine media file.
8. Don’t open email attachments forwarded to us
A good practice is if we don’t recognise a sender of an email, don’t click on any links within it. Statics says 44.8 percent of virus infections happen because the computer user clicked on something.
9. Make sure we have a security app
Download a mobile security app that scans every app we download for malware and spyware and can help us locate a lost or stolen device. Also, make sure the security app protects from unsafe websites.
10. Don’t use our pc’s admin account
Whatever operating system we use, make sure we’re not logging in with the administrator account. Further, make sure our family members aren’t either. Sure, we’ll need an admin account for various tasks, but no one needs it to be their daily account. Instead, create user accounts for our self and family members. These accounts should feature limited privileges that protect the system from malicious software and over-enthusiastic clicking.