{"id":1096,"date":"2023-10-11T08:35:28","date_gmt":"2023-10-11T08:35:28","guid":{"rendered":"https:\/\/pbscompany.smartwebsitedesign.com\/?p=1096"},"modified":"2024-07-29T16:40:04","modified_gmt":"2024-07-29T20:40:04","slug":"8-ways-to-avoid-malware","status":"publish","type":"post","link":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/","title":{"rendered":"8 Ways to Avoid Malware"},"content":{"rendered":"\n

It\u2019s virtually impossible to be on the Internet without coming across something that could be malware. Because of this, we need to be mindful of the websites we are visiting, links we are clicking on, and files we are downloading. According to our partner, Cisco<\/a>, malware\u00a0is developed as harmful software that invades or corrupts your computer network with the intent of stealing information or sabotaging files. Common examples of malware include worms, Trojan viruses, spyware, adware, and ransomware. <\/p>\n\n\n\n

Read below for our 8 tips to avoid malware.<\/p>\n\n\n\n

<\/h2>\n\n\n\n

1. Always follow policy<\/strong><\/p>\n\n\n\n


Most businesses and IT departments have a set of policies and procedure to keep the business and its employees protected from cyber security threats.<\/p>\n\n\n\n

2. Think before you click<\/strong><\/p>\n\n\n\n


If an email looks suspicious then alert your IT or security department. Don\u2019t click on any links or download attachments<\/p>\n\n\n\n

3. Install anti-virus and anti-malware software<\/strong><\/p>\n\n\n\n


Your IT department probably has you equipped with ant-virus software already, if not, do some research and find the best one for your business. Also, make sure your personal devices have anti-virus software as well.<\/p>\n\n\n\n

4. Keep off public WiFi networks<\/strong><\/p>\n\n\n\n


Open networks are usually untrustworthy and leave you susceptible to cybercriminals. If possible, try to use a VPN on public networks.<\/p>\n\n\n\n

5. Make sure your devices are up-to-date.<\/strong><\/p>\n\n\n\n


Always ensure your devices, including computers, laptops, mobile devices, and tablets have the latest updates and security patches.<\/p>\n\n\n\n

6. Check the website you\u2019re on<\/strong><\/p>\n\n\n\n


In some cases, cybercriminals wil setup imposter websites in an attempt to steal your information. You may think you\u2019re on Facebook but you accidentally spelled it wrong and wound up on a fraudulent website.<\/p>\n\n\n\n

7. Check your downloads<\/strong><\/p>\n\n\n\n

Check your sources before downloading any software. Like the tip from above, you could be on an imposter website and downloading infected software.<\/p>\n\n\n\n

8. Use an adblocker<\/strong><\/p>\n\n\n\n

We mentioned malvertising in this blog post. While some ads are legitimate, others are infected with malicious code in an attempt to steal your data.<\/p>\n","protected":false},"excerpt":{"rendered":"

It\u2019s virtually impossible to be on the Internet without coming across something that could be malware. Because of this, we need to be mindful of the websites we are visiting, links we are clicking on, and files we are downloading. According to our partner, Cisco, malware\u00a0is developed as harmful software that invades or corrupts yourContinue reading “8 Ways to Avoid Malware”<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1775,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1096","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"\n8 Ways to Avoid Malware - Preferred Business Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Ways to Avoid Malware - Preferred Business Systems\" \/>\n<meta property=\"og:description\" content=\"It\u2019s virtually impossible to be on the Internet without coming across something that could be malware. Because of this, we need to be mindful of the websites we are visiting, links we are clicking on, and files we are downloading. According to our partner, Cisco, malware\u00a0is developed as harmful software that invades or corrupts yourContinue reading "8 Ways to Avoid Malware"\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Preferred Business Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PBSMakingITSimple\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-11T08:35:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-29T20:40:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"671\" \/>\n\t<meta property=\"og:image:height\" content=\"430\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"reachuniversal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pbscompany\" \/>\n<meta name=\"twitter:site\" content=\"@pbscompany\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"reachuniversal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/\"},\"author\":{\"name\":\"reachuniversal\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c\"},\"headline\":\"8 Ways to Avoid Malware\",\"datePublished\":\"2023-10-11T08:35:28+00:00\",\"dateModified\":\"2024-07-29T20:40:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/\"},\"wordCount\":329,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/\",\"url\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/\",\"name\":\"8 Ways to Avoid Malware - Preferred Business Systems\",\"isPartOf\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg\",\"datePublished\":\"2023-10-11T08:35:28+00:00\",\"dateModified\":\"2024-07-29T20:40:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#primaryimage\",\"url\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg\",\"contentUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg\",\"width\":671,\"height\":430,\"caption\":\"Blocking spam e-mail, warning pop-up for phishing mail, network security concept. Business man working on laptop computer at home with warning window on screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wp.pbscompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Ways to Avoid Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wp.pbscompany.com\/#website\",\"url\":\"https:\/\/wp.pbscompany.com\/\",\"name\":\"Preferred Business Systems\",\"description\":\"Making IT Simple Since 1997!\",\"publisher\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wp.pbscompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/wp.pbscompany.com\/#organization\",\"name\":\"Preferred Business Systems\",\"url\":\"https:\/\/wp.pbscompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg\",\"contentUrl\":\"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"Preferred Business Systems\"},\"image\":{\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PBSMakingITSimple\",\"https:\/\/x.com\/pbscompany\",\"https:\/\/www.linkedin.com\/company\/pbscompany\",\"https:\/\/www.youtube.com\/channel\/UC-VcP48uj6Z3pvDbA-K6dWw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c\",\"name\":\"reachuniversal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wp.pbscompany.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g\",\"caption\":\"reachuniversal\"},\"sameAs\":[\"https:\/\/reachuniversal.com\"],\"url\":\"https:\/\/wp.pbscompany.com\/blog\/author\/reachuniversal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Ways to Avoid Malware - Preferred Business Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/","og_locale":"en_US","og_type":"article","og_title":"8 Ways to Avoid Malware - Preferred Business Systems","og_description":"It\u2019s virtually impossible to be on the Internet without coming across something that could be malware. Because of this, we need to be mindful of the websites we are visiting, links we are clicking on, and files we are downloading. According to our partner, Cisco, malware\u00a0is developed as harmful software that invades or corrupts yourContinue reading \"8 Ways to Avoid Malware\"","og_url":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/","og_site_name":"Preferred Business Systems","article_publisher":"https:\/\/www.facebook.com\/PBSMakingITSimple","article_published_time":"2023-10-11T08:35:28+00:00","article_modified_time":"2024-07-29T20:40:04+00:00","og_image":[{"width":671,"height":430,"url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg","type":"image\/jpeg"}],"author":"reachuniversal","twitter_card":"summary_large_image","twitter_creator":"@pbscompany","twitter_site":"@pbscompany","twitter_misc":{"Written by":"reachuniversal","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#article","isPartOf":{"@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/"},"author":{"name":"reachuniversal","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c"},"headline":"8 Ways to Avoid Malware","datePublished":"2023-10-11T08:35:28+00:00","dateModified":"2024-07-29T20:40:04+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/"},"wordCount":329,"commentCount":0,"publisher":{"@id":"https:\/\/wp.pbscompany.com\/#organization"},"image":{"@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/","url":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/","name":"8 Ways to Avoid Malware - Preferred Business Systems","isPartOf":{"@id":"https:\/\/wp.pbscompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#primaryimage"},"image":{"@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg","datePublished":"2023-10-11T08:35:28+00:00","dateModified":"2024-07-29T20:40:04+00:00","breadcrumb":{"@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#primaryimage","url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg","contentUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg","width":671,"height":430,"caption":"Blocking spam e-mail, warning pop-up for phishing mail, network security concept. Business man working on laptop computer at home with warning window on screen"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.pbscompany.com\/blog\/8-ways-to-avoid-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.pbscompany.com\/"},{"@type":"ListItem","position":2,"name":"8 Ways to Avoid Malware"}]},{"@type":"WebSite","@id":"https:\/\/wp.pbscompany.com\/#website","url":"https:\/\/wp.pbscompany.com\/","name":"Preferred Business Systems","description":"Making IT Simple Since 1997!","publisher":{"@id":"https:\/\/wp.pbscompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.pbscompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wp.pbscompany.com\/#organization","name":"Preferred Business Systems","url":"https:\/\/wp.pbscompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg","contentUrl":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/pbs-logo3.svg","width":"1024","height":"1024","caption":"Preferred Business Systems"},"image":{"@id":"https:\/\/wp.pbscompany.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PBSMakingITSimple","https:\/\/x.com\/pbscompany","https:\/\/www.linkedin.com\/company\/pbscompany","https:\/\/www.youtube.com\/channel\/UC-VcP48uj6Z3pvDbA-K6dWw"]},{"@type":"Person","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/person\/5327d131a2748d133ef15efb43a65e2c","name":"reachuniversal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.pbscompany.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2b4a7f24629c25bbddf9871124f5925?s=96&d=mm&r=g","caption":"reachuniversal"},"sameAs":["https:\/\/reachuniversal.com"],"url":"https:\/\/wp.pbscompany.com\/blog\/author\/reachuniversal\/"}]}},"jetpack_featured_media_url":"https:\/\/wp.pbscompany.com\/wp-content\/uploads\/malware-pbs-company-blog-e1722265009235.jpg","_links":{"self":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts\/1096"}],"collection":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/comments?post=1096"}],"version-history":[{"count":5,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts\/1096\/revisions"}],"predecessor-version":[{"id":1780,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/posts\/1096\/revisions\/1780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/media\/1775"}],"wp:attachment":[{"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/media?parent=1096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/categories?post=1096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.pbscompany.com\/wp-json\/wp\/v2\/tags?post=1096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}