⬆️ ⬇️

Winning security model

In the yard - 2007, and malware already last year reached a record level of growth and technical sophistication. In our experience, many of us have already encountered spyware, viruses, worms, and other malicious programs, and therefore we wisely decided to take appropriate measures for our own protection.



Even those who managed to avoid infection, it is worth seriously resort to measures online security. Everyone needs reliable protection that covers as many areas of risk as possible and that can protect you online without interfering with your work.



But what is the focus of your search for security tools - antivirus, firewall, end-to-end solution or something else? Agnitum talks about how to choose the best combination of tools to counter modern threats. The “In the World of Security” newsletter was written to help you make an informed choice; With the help of short videos and simple descriptions, we show how modern malware infects computers, and prove why this should be a guide to action.

')

Safety in theory



Essentially, a computer is reliably protected from most threats if the following fundamental requirements are met:



1. There are elements of proactive protection. They can include intrusion prevention systems (Host Intrusion Prevention Systems, HIPS) and their immediate relatives — activity limiters, behavior analyzers, OS protection tools and privilege escalation barriers, as well as firewalls and other solutions that proactively counter threats trying to activate or spread on the computer.



2. There are elements of reactive protection. They include traditional antiviruses and antispyware programs, as well as other products based on signature-based search and heuristic analysis.



3. There is a user's understanding of the basic aspects of computer security, including knowledge of the key functions of the system, the basics of file and program interaction, an understanding of the need to update software and other aspects of safe behavior on the network, widely reported on security portals like this one .



Interesting? Read and watch videos >>

Source: https://habr.com/ru/post/8955/



All Articles