{"id":66,"date":"2024-09-23T16:44:29","date_gmt":"2024-09-23T16:44:29","guid":{"rendered":"https:\/\/computerbasicshub.net\/?page_id=66"},"modified":"2025-06-24T20:22:05","modified_gmt":"2025-06-24T20:22:05","slug":"win10security","status":"publish","type":"page","link":"https:\/\/computerbasicshub.net\/index.php\/win10security\/","title":{"rendered":"Windows 10 Security"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-block-group alignwide has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-1 wp-block-group-is-layout-constrained\">\n<!DOCTYPE html>\n<html>\n<head>\n\t<meta http-equiv=\"content-type\" content=\"text\/html; charset=utf-8\"\/>\n\t<title><\/title>\n\t<meta name=\"generator\" content=\"LibreOffice 7.6.0.3 (Windows)\"\/>\n\t<meta name=\"created\" content=\"2021-01-27T12:41:04.885000000\"\/>\n\t<meta name=\"changed\" content=\"2023-10-17T14:16:29.507000000\"\/>\n\t<style type=\"text\/css\">\n\t\t@page { margin: 2cm }\n\t\ttd p { line-height: 115%; margin-bottom: 0.25cm; background: transparent }\n\t\tp { line-height: 115%; margin-bottom: 0.25cm; background: transparent }\n\t\ta:link { so-language: zxx }\n\t<\/style>\n<\/head>\n<body lang=\"en-US\" dir=\"ltr\"><p style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p align=\"center\" style=\"margin-bottom: 0cm\"><font size=\"6\" style=\"font-size: 26pt\"><b>Windows\n10 Security<\/b><\/font><\/p>\n<p align=\"center\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<table width=\"900\" cellpadding=\"0\" cellspacing=\"0\" style=\"background: transparent; page-break-inside: avoid\">\n\t<col width=\"900\"\/>\n\t<tr>\n\t\t<td width=\"900\" valign=\"top\" style=\"border: none; padding: 0cm\"><p align=\"left\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/computerbasicshub.net\/winsecurityicon.jpg\" name=\"Image1\" align=\"right\" width=\"274\" height=\"191\" border=\"0\"\/>\n<br\/>\n\n\t\t\t<\/p>\n\t\t<\/td>\n\t<\/tr>\n<\/table>\n<p align=\"left\" style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p style=\"margin-bottom: 0cm\"><br\/>\n\n<\/p>\n<p style=\"margin-left: 0.6cm; page-break-after: auto\"><font size=\"6\" style=\"font-size: 18pt\">Security for\nWindows 10 includes a number of aspects. They include protecting\nWindows with an antivirus app running in the background, having\nfirewalls enabled and following best practices when using a Windows\ncomputer. Also, it is very important to only use the regular user\naccount(s) for everyday computer tasks such as using the Internet or\nediting documents to limit access to the Windows system by not using\nthe Administrator account for these tasks so computer viruses do not\nhave easy access to system files. Having good privacy settings in\nplace is important so your geolocation will be able to be hidden and\nany webcam on a monitor can be turned off. Always having Windows up\nto date with automatic updates being installed when they are released\nis recommended so vulnerabilities in Windows 10 are patched up when\nthey arise. By having automatic Windows updates in place, as security\nvulnerabilities are eliminated, online threats to Windows will be\nless effective. Protection from emails that are scams is an important\naspect of Windows security, too. Email scams are a form of spam which\ncould be a source of computer viruses and even malware. \n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.6cm; page-break-after: auto\"><font size=\"6\" style=\"font-size: 20pt\"><b>Antivirus\nApps<\/b><\/p>\n<p style=\"margin-left: 0.6cm; page-break-after: auto\">Antivirus apps\nare very important for Windows 10&#8217;s security from computer viruses.\nOver the Internet, computer viruses and malware can be easily\ndownloaded onto computers. Windows operating systems are especially\nprone being infected by computer viruses and malware. Microsoft by\ndefault has its own antivirus app, Windows Defender. However,\nthird-party antivirus apps usually offer greater protection of\nWindows 10 from computer viruses. While Windows Defender blocks most\nviruses and malware from entering the given Windows computer system,\nit provides a slightly reduced protection against online viruses and\nviruses from installed software. Also, it has less features than\nrequired for sound protection of Windows from external threats from\nviruses and malware. This opens the door for computers to be at a\ngreater risk than needed from viruses and malware. However, a number\nof third-party antivirus apps provide more robust protection of\ncomputers against viruses. They include the following.<\/p>\n<p style=\"margin-left: 2cm; page-break-after: auto\"><font size=\"6\" style=\"font-size: 18pt\"><b>Antivirus Apps<\/b><\/p>\n<ul>\n\t<li><p style=\"page-break-after: auto\">Norton Antivirus<\/p><\/li>\n\t<li><p style=\"border: none; padding: 0cm\">McAfee<\/p><\/li>\n\t<li><p style=\"border: none; padding: 0cm\">Avast Antivirus<\/p><\/li>\n\t<li><p style=\"border: none; padding: 0cm\">BitDefender<\/p><\/li>\n\t<li><p style=\"border: none; padding: 0cm\">Windows Defender\n\t(Microsoft&#8217;s default antivirus app)<\/p><\/li>\n<\/ul>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.5cm; margin-right: 12.2cm; page-break-after: auto\">\n<font size=\"4\" style=\"font-size: 18pt\"><b>Anti-malware\nApps<\/b><\/p>\n<ul>\n\t<li><p style=\"page-break-after: auto\">Malwarebytes<\/p><\/li>\n\t<li><p style=\"border: none; padding: 0cm\">TOTAL AV<\/p><\/li>\n\t<li><p style=\"border: none; padding: 0cm\">Avira<\/p><\/li>\n\t<li><p style=\"border: none; padding: 0cm\">Spybot Search &amp;\n\tDestroy<\/p><\/li>\n<\/ul>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.5cm; margin-right: 12.2cm; page-break-after: auto\">\n<font size=\"6\" style=\"font-size: 18pt\">For removal of\nmalware, Malwarebytes is good in terms of effectiveness. It tends to\ndetect malware antivirus products like Norton Antivirus are unable to\ndetect. Other anti-malware apps are effective for isolating malware,\ntoo. You can determine the quality of the anti-malware app you would\nlike to use for malware removal by going through its ratings on the\nInternet. When encountering an issue related to malware infection,\nrunning a full scan of the computer is a good idea since it would\nscan the entire filesystem of the computer to look for malware.\nHowever, on a regular basis, this is not advised to task the\nanti-malware app to do. This is because a full scan can be very time\nconsuming. It is better to have a fast scan of the most likely places\nin the filesystem to contain malware done by the anti-malware app by\na scheduled time. It is more effective to do timed quick scans for\nmalware by anti-malware apps<\/p>\n<p style=\"margin-left: 0.6cm; border: none; padding: 0cm\">It is very\nimportant to update antivirus apps and anti-malware apps every year\nso they are able to respond to emerging threats to computer systems. \n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.5cm; margin-right: 12.2cm; page-break-after: auto\">\n<font size=\"4\" style=\"font-size: 18pt\"><b>Firewalls<\/b><\/p>\n<table width=\"10%\" cellpadding=\"5\" cellspacing=\"0\" style=\"page-break-inside: avoid\">\n\t<col width=\"256*\"\/>\n\t<tr>\n\t\t<td width=\"100%\" height=\"121\" valign=\"top\" style=\"border: none; padding: 0cm\"><p>\n\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/computerbasicshub.net\/firewalliconimg.jpg\" name=\"Image2\" align=\"right\" width=\"167\" height=\"99\" border=\"0\"\/>\n<br\/>\n\n\t\t\t<\/p>\n\t\t<\/td>\n\t<\/tr>\n<\/table>\n<p style=\"margin-left: 0.6cm; border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.5cm; margin-right: 12.2cm; page-break-after: auto\">\n<font size=\"6\" style=\"font-size: 18pt\">Firewalls in\ncomputer systems control access of incoming traffic to the computer\nand outgoing traffic to external networks based on predetermined\nrules. They are important in order to safeguard a given computer\nsystem from external threats. Normally, antivirus apps have firewalls\nthat are enabled by default. This is important for blocking\npotentially risky port connections. Data entering in from a blocked\nport is discarded by the firewall. On the other hand, data entering\nin from a port not blocked, reaches its destination. Firewalls should\nbe configured on the antivirus app the computer is using for\nprotection against viruses.<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.5cm; margin-right: 12.2cm; page-break-after: auto\">\n<font size=\"4\" style=\"font-size: 18pt\"><b>Maintaining\nBest Practices<\/b><\/p>\n<p style=\"margin-left: 0.6cm; page-break-after: auto\">Keeping Windows\n10 and the user files secure from external threats requires both\nantivirus protection of the computer and best practices being\nfollowed. Below, is a list of Best Practices for keeping Windows 10\nsecure from viruses and malware. \n<\/p>\n<p style=\"margin-left: 0.6cm; page-break-after: auto\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.6cm; border: none; padding: 0cm\"><b>Best\nPractices<\/b><\/p>\n<ul>\n\t<li><p style=\"page-break-after: auto\">Avoid opening links or\n\tattached files in spam emails or Junk folder emails.<\/p><\/li>\n\t<li><p style=\"page-break-after: auto\">Have an antivirus app running\n\tin the background on a Windows 10 computer.<\/p><\/li>\n\t<li><p style=\"page-break-after: auto\">Do not go to suspicious\n\twebsites. They may pose a security threat to your computer.<\/p><\/li>\n\t<li><p style=\"page-break-after: auto\">Avoid going to websites that\n\thave not upgraded to HTTPS, as much as possible. Some older web\n\tpages still use the less secure, HTTP, protocol in the URL.<\/p><\/li>\n\t<li><p style=\"page-break-after: auto\">Avoid using the Administrator\n\taccount of Windows for tasks which do not require it to be used for.<\/p><\/li>\n\t<li><p style=\"page-break-after: auto\">Require Windows accounts to\n\thave a password assigned to each of them.<\/p><\/li>\n\t<li><p style=\"page-break-after: auto\">Keep Windows 10 updated by\n\tautomatic updates.<\/p><\/li>\n\t<li><p style=\"page-break-after: auto\">Limit the apps you install on\n\tWindows 10.<\/p><\/li>\n<\/ul>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.7cm; page-break-after: auto\">Keeping good\npractices in use while using Windows 10 will help to keep the\ncomputer more secure. Protection of privacy of documents and other\npersonal data is also enhanced by keeping Windows computers secure.\nBacking up important files is important to do, too, every once in a\nwhile. With laptops, this is especially important. Backups should\nalso include legal documents which must be kept for future reference.\nIt is important to note, backups need to be stored on external disks\nor drives. This is so if the computer itself gets corrupted or\nphysically compromised, backed up files can be recovered. It is a\ngood practice to have passwords assigned to user accounts to limit\naccess to them. For admin accounts, this is especially important.\nAdmin accounts should only be accessible by authorized users. \n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.7cm; page-break-after: auto\"><b>Securing\nWindows from email threats<\/b><\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\">Emails can\npose a threat to Windows 10. This is true if they contain viruses,\nmalware and even links to web pages that could harm a Windows\ncomputer.<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\">Email scams\nare a form of spam which could be a source of computer viruses and\neven malware.<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\">For more\nregarding spam, see the below link.<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><a href=\"https:\/\/computerbasicshub.net\/spampg.html\"><font color=\"#0000ff\">Spam<\/font><\/a><\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\">To be on\nthe safe side, when you come across an email that looks like it is a\nscam from the Subject in the Inbox, it is best to move it into the\nJunk folder. By doing this, the email service should automatically\nmove the given email based on its email address to the Junk folder\nevery time you receive an email from the specified email address.\nAlso, having an active antivirus app running on the computer is\nimportant for catching viruses from email. This is true for all\noperating systems. It is best to not use email in an Administrator\naccount for security reasons. Also, it is advised to not open emails\nin unsupported versions of Windows due to security risks to the\ncomputer system. The same is true for any unsupported operating\nsystem. This is the same for other supported versions of Windows.<\/p>\n<p style=\"margin-left: 0.6cm; page-break-after: auto\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><font size=\"4\" style=\"font-size: 18pt\"><b>Virus\nand Malware Removal<\/b><\/font><\/p>\n<p style=\"margin-left: 0.5cm; margin-right: 12.2cm; page-break-after: auto\">\n<font size=\"6\" style=\"font-size: 18pt\">To remove\ncomputer viruses and malware, from a computer&#8217;s filesystem, an\nantivirus app or an anti-malware app needs to be ran to do a virus or\nmalware scan. Once the virus or malware scan is completed, known\nthreats will be quarantined and can then be deleted by the given app.\nSometimes RKill has to be used to stop viral processes interfering\nwith the operation of Windows, first. There are some viruses which\nare more difficult to remove. For these viruses, specific\ninstructions and software tools may be required. Virus-specific\ninstructions are often necessary to follow for removing them. Quite\noften, specific virus removal apps are required for this process,\ntoo. An example of a difficult virus your antivirus app may come\nacross is, Flame, in terms of removal. It is important to not\nmanually just delete virus files. Only antivirus and anti-malware\napps should be used to remove computer viruses and malware. These\ninclude virus\/malware-specific software for removal purposes.\nAvoiding antivirus virus scan alert message web browser alerts is\nimportant. These are almost always scams in the form of viruses.<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\">For more\ninformation on security for Windows 10, a number of links are below.<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><font size=\"6\" style=\"font-size: 16pt\"><b>Links:<\/b><\/font><\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><font size=\"6\" style=\"font-size: 16pt\"><a href=\"https:\/\/www.webroot.com\/ca\/en\/resources\/tips-articles\/what-is-anti-virus-software\"><font color=\"#0000ff\">WEBROOT\n&#8211; What is Antivirus Software?<\/font><\/a><\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><a href=\"https:\/\/www.webopedia.com\/definitions\/anti-malware\/\"><font color=\"#0000ff\">webopedia\n&#8211; Anti-Malware<\/font><\/a><\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/firewall\"><font color=\"#1100fc\">Kaspersky\n&#8211; What is a Firewall?<\/font> <\/a>\n<\/p>\n<p style=\"margin-left: 0.7cm; border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<p style=\"border: none; padding: 0cm\"><br\/>\n<br\/>\n\n<\/p>\n<\/body>\n<\/html>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Windows 10 Security Security for Windows 10 includes a number of aspects. They include protecting Windows with an antivirus app running in the background, having firewalls enabled and following best practices when using a Windows computer. Also, it is very important to only use the regular user account(s) for everyday computer tasks such as using [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-no-title","meta":{"footnotes":""},"class_list":["post-66","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/66","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":4,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/66\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/pages\/66\/revisions\/383"}],"wp:attachment":[{"href":"https:\/\/computerbasicshub.net\/index.php\/wp-json\/wp\/v2\/media?parent=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}