It seems whenever I tell someone that I repair computers for a living, I almost always get asked the question “What do you recommend for anti-virus software?”. I tell them that I use a layered approach to security, not relying on just one program for protection. I personally don’t like to use all-in-one security suites. It’s not that I don’t trust any particular software; I just don’t like having just one piece of software protecting my computer. Here’s how to use layered security to protect your computer.
Protecting your computer with layered security
Windows has had a pretty good firewall built-in since Windows Vista and it’s turned on by default. It comes pre-installed inside of Windows and is ready to go. There are also some great stand-alone programs like ZoneAlarm. This is also one of those additional features of all-in-one security software. It’s your choice.
This one is a no brainer. There are plenty of free and retail anti-virus programs on the market, and I have used quite few different ones over the years. Some internet service providers like Cox Communications even offer free security suite software. The only thing to keep in mind when picking an anti-virus program is the performance of the system you’re installing it on. I would not install a full-blown security suite like Norton or McAfee on a tablet or netbook.
Anti-malware / anti-spyware software
Anti-virus software normally looks for, you guessed it, viruses. I’ve cleaned out quite a few pieces of ransomware that anti-virus programs missed because it wasn’t a virus. Quite a few of anti-malware programs are meant to be run side-by-side with anti-virus software. But there are a couple of exceptions to this rule: McAfee software doesn’t like to work with Malwarebytes Anti-malware, but it can. And never install Microsoft Security Essentials along with SuperAnti-Spyware, as they are completely incompatible. It’s a long story, but basically they are the same program.
Enhanced Mitigation Experience Toolkit (EMET)
EMET actuality works as a shim between programs and the operating system. It looks for known patterns of attack and can prevent programs from getting access to the operating system. It can prevent a hacker from using security holes in programs until the developer issues an update. Just configure EMET to monitor any program that can access the Internet. I’ve seen it work first hand (rouge flash inside of browser) and it does what it’s meant to do.