Viruses, spyware and other malicious software or malicious code (malware) can stop your computer working properly, delete or corrupt your files, steal information, or allow others to access your computer and your personal or business information.
The consequences of a malware infection can be serious and far-reaching, from losing access to your files or becoming a victim of identity theft and fraud.
Viruses, spyware and other malicious software or malicious code (malware) can stop your computer working properly, delete or corrupt your files, steal information, or allow others to access your computer and your personal or business information.
Your computer can be infected by malware in a number of ways, including:
- clicking on false website links
- visiting websites that have been infected by malware
- downloading infected apps and files from the internet
- opening infected email attachments.
When you first install anti-virus software on a device, run a ‘full scan’ of the system to ensure there are no pre-existing virus infections, and then set up regular scans.
Important: Install anti-virus software on all devices and set the software to automatically check for updates on a daily basis.
Viruses, spyware and other malicious software or malicious code (malware) can stop your computer working properly, delete or corrupt your files, steal information, or allow others to access your computer and your personal or business information.
Anti-virus solutions differ in effectiveness and the range of malware types they cover. Before choosing an anti-virus product, consider reviews on reputable and trustworthy websites or magazines.
At a minimum, all anti-virus software should provide:
- protection and detection capabilities for malware, adware and spyware
- comprehensive anti-virus scanning.
Some anti-virus products may also include:
- a site adviser so your browser alerts you when visiting a suspicious or dangerous website
- malware protection with an integrated firewall.
Note if you install an anti-virus product with firewall functionality, you may need to disable your operating system’s built-in firewall. See your anti-virus and operating system vendor for more details.
Before choosing an anti-virus product, consider reviews on reputable and trustworthy websites or magazines.
Viruses, spyware and other malicious software or malicious code (malware) can stop your computer working properly, delete or corrupt your files, steal information, or allow others to access your computer and your personal or business information.
Ransomware attacks are typically delivered to a user via a malicious but legitimate looking email link or attachment. When the user opens the ransomware it will typically encrypt a user’s files, then demand a ransom to restore access – typically payable using cryptocurrency, like Bitcoin.
Certain malware that locks down your computer and files until a ransom is paid
Ransomware attacks are typically delivered to a user via a malicious but legitimate looking email link or attachment. When the user opens the ransomware it will typically encrypt a user’s files, then demands a ransom to restore access – typically payable using cryptocurrency, like Bitcoin.
Money
Ransom, an age-old and effective crime, is now being committed online. Ransomware offers cybercriminals a low-risk, high-reward income. It is easy to develop and distribute. Also in cybercriminals’ favour, most small businesses are unprepared to deal with ransomware attacks.
Never pay a ransom
You are not guaranteed to regain access to your information and may be vulnerable to a second attack.
Everyone
Many individuals and small businesses are often less security conscious, are less likely to implement cyber security measures, and spend less on cyber security measures. While medium and large businesses may have some considerations for cybersecurity measures, they too can benefit from inbuilt system security features – such as Microsoft’s ransomware protection.
Microsoft’s ransomware protection
Ransomware protection is a control on computers to stop a ransomware attack from encrypting access or files that are important to you. Microsoft has a built-in control to help protect devices from ransomware. It ensures folders you choose cannot be altered which prevents them from being encrypted down by a criminal. This guide will demonstrate how you can configure and use this control to protect your files from a ransomware attack.
While ransomware protection can be useful, having a backup stored offline is important in case you need to retrieve important files or information.
Setting up Ransomware Protection for Microsoft Windows 10 #
- Select the Windows icon in the bottom left of your screen and then click on the Settings Cog icon.
- Once in Settings, click on the Update & Security icon.
- Click Windows Security tab.
- Under the Protection areas list, click on Virus & threat protection.
- Click on Manage ransomware protection under Ransomware protection.
- In many cases, the Controlled folder access will be toggled off. If so, click on the toggle to turn it on.
- Once controlled folder access is turned on, click on Protected folders.
Note: You can only use this functionality if you are an administrator. If you are a standard account user, you will be prompted to login or authenticate using an Administrator account.
For more information regarding administrator and local user accounts, please refer to Managing User Accounts on Microsoft Windows 10.
- Click on Add a protected folder to select the folder you want to be added to the protected list.
By default, the following folders are already included in the Protected List:
- Documents
- Pictures
- Videos
- Music
- Favourites
Note: This will restrict applications from accessing any folders in the protected list.
- Optional: To allow applications to access files inside folders on the protected List, go back to the “ransomware protection” window and click on Allow an app through Controlled folder access. Then click Add an allowed app.
Note: This step is only recommended for users who are comfortable navigating the Windows folder structure. By default, Microsoft has a list of apps that are trusted and included behind-the-scenes. You may have applications such as MYOB or Adobe that are not part of this list.
Only allow apps that are reputable and trustworthy to access your folders in the Protected List, as this is similar to allowing a technician into your house without supervision.
Viruses, spyware and other malicious software or malicious code (malware) can stop your computer working properly, delete or corrupt your files, steal information, or allow others to access your computer and your personal or business information.
Malware is a blanket term for malicious software including viruses, spyware, trojans and worms.
Malicious software (malware)
Malware is a blanket term for malicious software including viruses, spyware, trojans and worms.
Malware gains access to important information such as bank or credit card numbers and passwords. It can also take control of or spy on a user’s computer. What criminals choose to do with this access and data includes:
- Theft
- Activism
- Espionage
- Other serious crimes
Anyone, anywhere
Malware creators can be anywhere in the world. They just need a computer, technical skills and malicious intent. Criminals can easily access cheap tools to use malware against you. It is not personal – they are not targeting you specifically – it is just business.
Microsoft Defender Antivirus
Microsoft Defender Antivirus is a built-in malware scanner for Microsoft Windows 10. As part of the Windows Security suite, it will search for any files or programs on your computer that can cause harm to it. Defender looks for software threats like viruses and other malware across email, apps, the cloud, and the web.
A malware scan is as effective as its last definition update, which means if it is not updated regularly it may be unaware of and unable to detect newer forms of malware. Microsoft Defender Antivirus is updated when Microsoft Windows 10 is updated, which is why automatic updates should be turned on.
To turn on automatic updates for Windows 10, please refer to our guide Turning On Automatic Updates (for Windows 10).
Performing a malware scan with Microsoft Defender Antivirus #
- Select the Windows icon in the bottom left of your screen and then click on the Settings Cog icon.
-
Once in Settings, click on the Update & Security icon
-
Click on Windows Security tab.
-
Under the Protection areas section, click on Virus & threat protection.
-
Under Current threats section, click on Scan options.
-
Here you have four different scan options to detect malware. It is recommended to save and close your files before starting a scan. While you can continue to use your computer during some scans, this may lead to inaccurate results and you could experience issues with speed and performance. Once you have selected your Scan, click Scan now.
-
You will see the progress, estimated time remaining and other information once you start the scan.
-
When finished, you will receive summary information from the scan.
-
In the event that the summary information identifies malware click Start actions and follow the on-screen prompts to remove the malware.