Preventing Pop-ups and fake security

We have become so dependent on this electronic world we have built.  With such critical information as medical records and banking, it is imperative that we protect ourselves from the many cyber threats lurking at every turn.  

Common variants of these cyber threats are pop-ups and fake security applications (ie. fake anti-virus, fake anti-spyware, and fake anti-malware). The best way to stop these threats is to prevent them from ever taking hold of your system in the first place.

If you are already infected with something, see my post on Recovering from a Spyware or Virus Infection.  Otherwise these few steps may help keep your systems running cleanly:

  • Upgrade to the latest version of Windows.  Each version of Windows includes stronger security than the prior versions.  To make upgrading easier, Microsoft now allows users to purchase an upgrade to their version of Windows from the Microsoft Store.
  • Install Windows Updates.  Make sure all of your Windows critical updates are installed.  Critical updates often fix these known vulnerabilities, keeping you protected.
  • Stand-alone anti-virus (AV) is not enough.  I usually recommend running a full anti-malware protection suite like VIPRE Business Premium for enterprise machines, or Norton 360 for home users.  These full anti-malware protection suites  include several components to help protect your system from viruses, trojans, worms, and spyware. Both of these protection suites also run resident (runs continuously), keeping your system protected all the time, not just when not running a scheduled scan.
  • Software firewall is important on every PC.  If you’re not running a protection suite which includes one (such as those included Norton 360 or VIPRE Internet Security), Windows comes with a built-in software firewall which isn’t half bad.  Make sure this is turned on so your internet/network traffic is secured.
  • Hardware Firewall or router running Network Address Translation (NAT) can also help protect your entire network.  A wired or wireless router with NAT can provide basic protection. The more protection you have on your network’s perimeter the better.  Just like your anti-virus software, many higher end firewalls require constant updates to help keep your systems protected against new threats.  It is important to renew any subscriptions necessary to receive these updates for years to come.
  • If you do get a pop-up window asking for your input, do not click on any buttons on that window.  Instead, either click the X button to close the window, or press <Alt> + <F4> to close it.  Just because a button says “Cancel” doesn’t mean that there isn’t programming behind it to install a trojan onto your system. 
  • Constant vigilance is the most important component here but requires a bit of work including the following:
    • Make sure you’re viewing web sites from trusted sources (NY Times, Microsoft, etc.)
    • Don’t open attachments to suspicious looking emails or from unknown sources.
    • If an email looks suspicious not only should you not open it, but don’t even view it in a preview pane.  I often times ask senders if they meant to send an email message to me or if this was spam before I open a suspicious looking email.  
    • Before clicking on a link, hover over it to see where the link points to.  If it is pointing to an IP address (eg. or strange URL (eg. instead of a valid address (eg., then perhaps it is not wise to click on that link, as you have NO idea where it is sending you.

Related Articles:

Permanent link to this article:

Leave a Reply

Your email address will not be published.