Skip to main content

McAfee Security Tips - 13 Ways to Protect Your System



In addition to installing our products, we recommend that you follow these simple, common-sense precautions to reduce your exposure and protect your system.

  1. Do not open email attachments from an unknown, suspicious, or untrustworthy source. If you're not familiar with the sender, do not open, download, or execute any files or email attachments.
  1. Do not open an email attachment unless you know what it iseven if it appears to come from a friend or someone you know. Some viruses replicate themselves and spread via email. Stay on the safe side and confirm that the attachment was sent from a trusted source before you open it.
  1. Do not open any email attachments if the subject line is questionable. If you feel that the attachment may be important to you, always save the file to your hard drive before you open it.
  1. Delete chain emails and other spam from your inbox. It's best not to forward or reply to messages like these. Unsolicited, intrusive mail clogs up networks, may contain annoying or offensive content, and may result in security and privacy risks.
  1. Exercise caution when downloading files from the Internet. Make sure that the website is legitimate and reputable. Verify that an anti-virus program has checked the files on the download site. If you have any doubts, don't download the file at all. If you download software from the Internet, be especially vigilant of free software, which often carries adware or other potentially unwanted content along with it. Always read the privacy policies and end-user license agreements (EULAs) for software you install, regardless of the source. Be especially wary of screensavers, games, browser add-ons, peer-to-peer (P2P) clients, and any downloads claiming to be “cracked” or free versions of expensive applications, such as Adobe® PhotoShop® or Microsoft® Office. If it sounds too good to be true, it probably is.
  1. Avoid downloads from non-web sources altogether. The chances of downloading infected software from Usenet groups, IRC channels, instant messaging clients, or P2P is very high. Links to websites seen in IRC and instant messaging also frequently point to infected downloads. Avoid obtaining your software from these sources.
  1. Update your anti-virus software often. Threats are on the increase, and they are constantly evolving. Hundreds of viruses are discovered each month. To make sure that you are protected against the newest breed of threats, update your anti-virus software frequently. That means downloading the latest virus signature files and the most current version of the scanning engine.
  1. Back up your files frequently. If a virus infects your files, at least you can replace them with your backup copy. It's a good idea to store your backup files (on CDs or flash drives) in another secure physical location away from your computer.
  1. Update your operating system, web browser, and email program on a regular basis. For example, you can get Microsoft® security updates for Microsoft Windows and Microsoft Explorer at http://www.McAfee.uk.com/index.html
  1. Vigilance is the best defense against phishing scams. “Phishing” describes scams that attempt to acquire confidential information such as credit card numbers, personal identity data, and passwords by sending out emails that look like they come from real companies or trusted individuals. If you happen to receive an email message announcing that your account will be closed, that you need to confirm an order, or that you need to verify your billing information, do not reply to the email or click on any links. If you want to find out whether the email is legitimate, you can contact the company or individual directly by calling or writing to them.
  1. Do not open messages or click on links from unknown users in your instant messaging program. Instant messaging can be a vehicle for transmitting viruses and other malicious code, and it’s another means of initiating phishing scams.
  1. Use a personal firewall. A hardware firewall that sits between your DSL router or cable modem will protect you from inbound attacks. It’s a must for broadband connections. A software firewall runs on your PC and can protect you from both inbound and outbound attacks.
  1. Check your accounts and credit reports regularly. Identity thieves can begin using your personal information to open accounts, purchase goods, and make your life miserable within minutes of obtaining that data. Check your bank account and credit card statements frequently. That way, if you discover that your personal information has been compromised, you can alert credit companies and banks immediately, so they can close your accounts.


Comments

Popular posts from this blog

McAfee Internet protection: Manage Devices
When we are using Mcafee Productin our devices ,so this article will help you how to perform the mcafee products and manage the devices. 
At Optimum, we want to provide a safe Internet experience for our customers. That is why we have partnered with McAfee a security industry leader to provide Internet protection. McAfee is part of Intel Security. If you have not installed Internet protection McAfee click here.My Account PortalTo add or remove devices covered with your subscription to Internet protection, use the My Account portal. Settings for specific devices cannot be managed through the My Account portal, that is done within the Application Console.
Add Devices in My AccountSign in to the My Account portal going to Optimum.net/protectTo add a device, click the Download on the tab. You can protect up to 20 devices.Choose a product - you have a choice of PC/Laptop, Mac, Smartphone and TabletPC/Laptop and Mac have choices for McAfee Multi Access…
What are the steps to install mcafee using a mcafee livesafe retail card
In case, you have obtained McAfee retail card in store and looking to cash in this card to download and install this application on your PC and activate your card then no worries, McAfee support explains you all here in this blog today.Just follow these given steps and soon you’ll be enjoying the benefits of this card and will be able to secure your PC. In case, you face some issues on your PC then connect with an expert. You don’t have to worry anymore these are simple steps, even if you are not tech savvy despite that you can easily follow them.Steps to follow:Solution 1Activate your subscriptionFirst turn on your PC and connect it to a secured internet network and open your web browser and there you have to enter the URL you have on your card.Next, you need to choose language and country from its dropdown list.Note: when you register this page tries to choose your region automatically and might be possible that…
How to Activate Your McAfee Product /Redeem Your Retail Card :When ever we can use Mcafee Product in Our PC  , then we can easily activate our Mcafee product using these steps shown below :Follow these steps to redeem a McAfee software product card that you purchased or freeware .

After you redeem the card, you can download and install your McAfee software and activate your subscription.

Step -1 ) Open a web browser and go to the link shown on your retail card

Step -2 ) Select:
Your country and language.
The registration page tries to select the correct region, but it might not always get this right. Confirm that the region is correct before you continue.

Step -3 ) Type:
The activation code from your retail card.
Your Email Address.

Step -4 ) Click Submit.
When prompted, check that your Email Address is correct. If your email address is incorrect:
Click Edit to return to the previous screen.
Correct your email address.

Step -5 ) Click Verify.
Your subscription is now activated.

Step -6 ) Follow the …