{"id":3256,"date":"2022-02-25T08:00:00","date_gmt":"2022-02-25T16:00:00","guid":{"rendered":"https:\/\/computertechsreno.com\/tips\/?p=3256"},"modified":"2023-12-14T07:05:59","modified_gmt":"2023-12-14T15:05:59","slug":"antivirus-will-not-protect-you","status":"publish","type":"post","link":"https:\/\/computertechsreno.com\/tips\/antivirus-will-not-protect-you\/","title":{"rendered":"An Antivirus Will Not Protect You from User Error\u00a0"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/02\/bigstock-Cyber-Security-Technology-And-413790449.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"679\" src=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/02\/bigstock-Cyber-Security-Technology-And-413790449-1024x679.jpg\" alt=\"An Antivirus Will Not Protect You from User Error\" class=\"wp-image-3250\" srcset=\"https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/02\/bigstock-Cyber-Security-Technology-And-413790449-1024x679.jpg 1024w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/02\/bigstock-Cyber-Security-Technology-And-413790449-500x332.jpg 500w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/02\/bigstock-Cyber-Security-Technology-And-413790449-150x99.jpg 150w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/02\/bigstock-Cyber-Security-Technology-And-413790449-768x509.jpg 768w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/02\/bigstock-Cyber-Security-Technology-And-413790449-1536x1019.jpg 1536w, https:\/\/computertechsreno.com\/tips\/wp-content\/uploads\/2022\/02\/bigstock-Cyber-Security-Technology-And-413790449.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>It would be pretty great if antivirus protected us from all the online security threats out there. Unfortunately, though, this isn\u2019t the case.<\/p>\n\n\n\n<p>Often, customers ask us if they should purchase a third-party antivirus software rather than use the basic one that comes with their operating system. Our answer to this question is usually: stick to the antivirus that comes with your computer.\u00a0<\/p>\n\n\n\n<p>Let\u2019s take a look at why below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-antivirus-can-and-can-t-do\"><strong>What antivirus can and can\u2019t do<\/strong><\/h2>\n\n\n\n<p>Antivirus software works by scanning your devices, applications and files for traces of viruses or malware. Viruses are a type of malicious computer program designed to alter how your computer operates. It can, for example, steal sensitive data or lock you out of accessing your files.<\/p>\n\n\n\n<p>Viruses are scary stuff &#8211; and antivirus is vital for defending against these types of threats. However, antivirus isn\u2019t a holy grail. It only protects against&nbsp;<em>one<\/em>&nbsp;type of cyber security threat. There are a whole plethora of other threats out there that you need to watch out for.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"human-error-is-the-biggest-security-threat-out-there-today\"><strong>Human error is the biggest security threat out there today&nbsp;<\/strong><\/h2>\n\n\n\n<p>Recent research found that a massive&nbsp;<a href=\"https:\/\/www.tessian.com\/research\/the-psychology-of-human-error\/\" target=\"_blank\" rel=\"noreferrer noopener\">85% of data breaches<\/a>&nbsp;can be traced back to human error. This means that it\u2019s not viruses or malware responsible for most successful cyberattacks; it\u2019s people.&nbsp;<\/p>\n\n\n\n<p>As humans, we all make mistakes &#8211; and this is what today\u2019s cybercriminals count on. Many of today\u2019s cyberattacks focus on manipulating victims into clicking suspicious links or sharing financial information with a fraudulent entity. Here are some examples:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing emails:\u00a0<\/strong>Phishing emails are fraudulent emails criminals send to their victims. Typically, the email will impersonate a trusted brand. It will ask the victim to either call, click a link, download an attachment or share sensitive information. There were 241,342\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\">victims of phishing<\/a>\u00a0in the US in 2020 &#8211; and those are just the ones that were reported.\u00a0<\/li>\n\n\n\n<li><strong>Dodgy online advertisements:\u00a0<\/strong>Malvertising is a type of cyber attack technique where hackers inject malicious code into advertisements. When you visit a website with malvertising the malicious code can launch anything from a harmless yet deceptive warning message, to enabling a hacker to steal your data or even take it for ransom.\u00a0<\/li>\n\n\n\n<li><strong>Replying to texts from unknown senders:&nbsp;<\/strong>Similar to phishing is what\u2019s known as SMishing. SMishing happens when a cybercriminal sends a fraudulent text to your&nbsp;<a href=\"https:\/\/computertechsreno.com\/keep-your-mobile-phone-number-safe-from-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener\">mobile<\/a>, pretending to be a trusted entity. The text will usually contain a link, which takes you to a page where you\u2019re asked to share sensitive information &#8211; like your bank card information.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-best-protection-is-education\"><strong>The best protection is education<\/strong><\/h2>\n\n\n\n<p><strong>&nbsp;<\/strong>All of the above cybercriminal tactics are not new. Phishing, malvertising and SMishing have been around for years. However, criminals continue to use these tactics because they have a high success rate.&nbsp;<\/p>\n\n\n\n<p>While antivirus and other solutions can protect against basic forms of malware, they can\u2019t stop a phishing\/SMishing message from landing in your inbox, nor can they prevent you from calling a scammer&#8217;s number in a deceptive pop-up ad or message.\u00a0<\/p>\n\n\n\n<p>To that end, the best way to protect yourself from today\u2019s cyber threats is through education. Understanding how to spot these threats can ensure you don\u2019t fall victim.&nbsp;<\/p>\n\n\n\n<p>Here are some tips to bear in mind.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-spot-phishing\"><strong>How to spot phishing<\/strong><\/h3>\n\n\n\n<p>Watch out for emails where:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The tone of the email sounds unfamiliar or strange&nbsp;<\/li>\n\n\n\n<li>You don\u2019t recognize the sender address<\/li>\n\n\n\n<li>There are spelling mistakes and grammatical errors&nbsp;<\/li>\n\n\n\n<li>The request seems urgent or unusual&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-spot-malvertising\"><strong>How to spot malvertising<\/strong><\/h3>\n\n\n\n<p>Watch out for pop-ups where:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The advert tells you to call a number to fix a problem with your device<\/li>\n\n\n\n<li>There are spelling errors in the copy&nbsp;<\/li>\n\n\n\n<li>The advert promises something too good to be true&nbsp;<\/li>\n\n\n\n<li>The advert doesn\u2019t seem relevant to your recent search history&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-spot-smsishing\"><strong>How to spot SMishing&nbsp;<\/strong><\/h3>\n\n\n\n<p>Watch out for texts where:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The message seems too good to be true&nbsp;<\/li>\n\n\n\n<li>The request appears urgent or unusual&nbsp;<\/li>\n\n\n\n<li>There are spelling and\/or grammatical errors in the message&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-to-do-if-you-re-not-sure-whether-an-email-or-text-is-genuine\"><strong>What to do if you\u2019re not sure whether an email or text is genuine<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/computertechsreno.com\/tips\/can-you-spot-a-phish-check-out-these-phishing-and-fake-email-examples\/\" target=\"_blank\" rel=\"noreferrer noopener\">Check out these clues and examples of phishing\/SMishing<\/a>.<\/p>\n\n\n\n<p>Often, cybercriminals will impersonate trusted brands in their phony emails and texts. They may pretend to be your healthcare provider or bank and request information urgently.\u00a0<\/p>\n\n\n\n<p>If you\u2019re not sure whether such a request is genuine, we advise that you validate any requests over a separate channel. For example, if you receive an email from your bank that you weren\u2019t expecting, call them to check if they sent that email. Always call and verify before engaging with these requests.&nbsp;<\/p>\n\n\n\n<p>Don\u2019t forget that we are happy to\u00a0support\u00a0you with your questions about information security and education. If you have any concerns about phishing and SMishing, we\u2019d be glad to take a look at your device for you.\u00a0<\/p>\n\n\n\n<p>As well as this, we can help with improving your computer\u2019s security defenses, so you experience less phishing and pop-up ads.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"protect-yourself-from-common-security-threats\"><strong>Protect yourself from common security threats<\/strong><\/h2>\n\n\n\n<p>Contact us today if you need help with protecting your computer or have any questions about phishing, SMishing, and malvertising.&nbsp;<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/computertechsreno.com\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us today.<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It would be pretty great if antivirus protected us from all the online security threats out there. Unfortunately, though, this isn\u2019t the case. Often, customers ask us if they should purchase a third-party antivirus software rather than use the basic one that comes with their operating system. Our answer to this question is usually: stick [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3250,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,4],"tags":[],"class_list":["post-3256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scams","category-security"],"_links":{"self":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/3256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/comments?post=3256"}],"version-history":[{"count":7,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/3256\/revisions"}],"predecessor-version":[{"id":3896,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/posts\/3256\/revisions\/3896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media\/3250"}],"wp:attachment":[{"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/media?parent=3256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/categories?post=3256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computertechsreno.com\/tips\/wp-json\/wp\/v2\/tags?post=3256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}