{"id":43395,"date":"2014-07-30T16:55:00","date_gmt":"2014-07-30T16:55:00","guid":{"rendered":"http:\/\/sticky-highjinx.flywheelsites.com\/?p=43395"},"modified":"2021-12-09T16:53:31","modified_gmt":"2021-12-09T21:53:31","slug":"3-tactics-to-avoid-viruses-and-spyware","status":"publish","type":"post","link":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/","title":{"rendered":"3 Sure Fire Tactics to Avoid Viruses and Spyware"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<h2 class=\"wp-block-heading\" id=\"h-minimize-the-risk-of-a-cyber-attack\">Minimize the Risk of a Cyber Attack<\/h2>\n\n\n\n<p>To have a fighting chance against today&#8217;s rampant security threats, end users have to be informed and proactive. Here are some practical guidelines to minimize the risk of infection and attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-1-use-complex-passwords-for-your-online-accounts\">1. Use complex passwords for your online accounts<\/h2>\n\n\n\n<p>Passwords should be a minimum of eight characters and contain a combination of letters, numbers and characters. Passwords should not be based on personally identifiable information, like your name, initials, date of birth, pet\u2019s name, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-2-avoid-downloading-and-installing-anything-you-do-not-understand-or-trust-no-matter-how-tempting-from-the-following-sources\">2. Avoid downloading and installing anything you do not understand or trust, no matter how tempting, from the following sources:<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-from-a-website\"><strong>From a Website<\/strong><\/h3>\n\n\n\n<p>If you are unsure, leave the site and research the software you are being asked to install. If it is OK, you can go back to the site and install it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-website-pop-up-alerts\"><strong>Website Pop-Up Alerts<\/strong><\/h3>\n\n\n\n<p>Web pop-up alerts falsely tell users that their machine is infected with a virus or has some other problem that needs to be fixed. The user will click on the alert and either be asked to install the software (really malware in disguise) that is purported to fix the problem, or a &#8220;drive-by&#8221; download will be initiated.<\/p>\n\n\n\n<p>Do not click or engage with the pop-up window; do not click on the &#8220;Pause&#8221; or &#8220;Stop&#8221; buttons. Close the window by either closing the browser completely or through the &#8220;X&#8221; in the upper right corner of the window.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-website-ads\"><strong>Website Ads<\/strong><\/h3>\n\n\n\n<p>Many ads are designed to persuade the user to click on the ad or to click on a &#8220;Close&#8221; button in the ad. When the user clicks on the ad or Close button, a &#8220;drive-by&#8221; download is initiated and malware is installed. Do not click on advertisements or Close buttons. Instead, close the window through the &#8220;X&#8221; in the upper right corner of the window.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-free-games-applications-and-screen-savers\"><strong>Free Games, Applications and Screen Savers<\/strong><\/h3>\n\n\n\n<p>Many free applications and games are simply vehicles designed to install malware. Even if the application itself is functional, malware may still be installed on your computer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-browser-toolbars\"><strong>Browser Toolbars<\/strong><\/h3>\n\n\n\n<p>Toolbars are technically not a virus, but they do exhibit plenty of malicious traits. Toolbars are ad-supported (users may see additional banner, search, pop-up, pop-under, interstitial and in-text link advertisements) cross web browser plug-ins for Internet Explorer, Firefox and Chrome and are distributed through various monetization platforms during installation.<\/p>\n\n\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"53370\" class=\"elementor elementor-53370\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-41ad0b5 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"26590\" data-id=\"41ad0b5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61a0c0b\" data-eae-slider=\"56986\" data-id=\"61a0c0b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-8e36e15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"84181\" data-id=\"8e36e15\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7452533\" data-eae-slider=\"68154\" data-id=\"7452533\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3001eb9 elementor-grid-1 elementor-posts--align-left elementor-grid-tablet-1 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"3001eb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;cards_columns_tablet&quot;:&quot;1&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-48087 post type-post status-publish format-standard has-post-thumbnail hentry category-white-paper tag-consumer-goods tag-distribution tag-food-beverage tag-information-technology tag-manufacturing tag-non-profit tag-private-equity tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"471\" src=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-768x471.jpg\" class=\"attachment-medium_large size-medium_large wp-image-117597\" alt=\"A brochure with a person touching a virtual network icon, titled Are Managed Services Right for Your Business? on a blue background. The brochure features enVista branding and technology-themed graphics.\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9c1b27b\" data-eae-slider=\"91935\" data-id=\"9c1b27b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e128e49 elementor-grid-1 elementor-grid-tablet-1 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"e128e49\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;cards_columns_tablet&quot;:&quot;1&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-48087 post type-post status-publish format-standard has-post-thumbnail hentry category-white-paper tag-consumer-goods tag-distribution tag-food-beverage tag-information-technology tag-manufacturing tag-non-profit tag-private-equity tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" tabindex=\"-1\" target=\"_blank\"><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-300x300.jpg\" class=\"attachment-medium size-medium wp-image-117597\" alt=\"A brochure with a person touching a virtual network icon, titled Are Managed Services Right for Your Business? on a blue background. The brochure features enVista branding and technology-themed graphics.\" srcset=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-300x300.jpg 300w, https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-150x150.jpg 150w, https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-60x60.jpg 60w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">White Paper<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" target=&quot;_blank&quot;>\n\t\t\t\tAre Managed Services Right for Your Business?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Gain insight into benefits and various use cases for infrastructure, application and business process managed services.<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" aria-label=\"Read more about Are Managed Services Right for Your Business?\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tDownload\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-media-players\"><strong>Media Players<\/strong><\/h3>\n\n\n\n<p>A popular source of malware is a website media player download. When a user wants to play a video, the website will ask to install a video codec or other required software. When the user installs the application, the malware is also installed and the video may or may not play.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-email\"><strong>Email<\/strong><\/h3>\n\n\n\n<p>Do not trust anything associated with a spam email. Approach email from people you know with caution when the message contains links or attachments. If you are suspicious of what you are being asked to view or install, don&#8217;t do it. &#8220;Don&#8217;t click on email links or attachments,&#8221; is a mantra most every user has heard repeatedly, yet users frequently fail to heed the warning.<\/p>\n\n\n\n<p>Whether distracted, too trustful of friends or colleagues, or simply fooled by a crafty email message, many users forget to be wary of links and attachments included within email messages, regardless of the source. Simply clicking on an email link or attachment can, within minutes, corrupt Windows, infect other machines and destroy critical data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-physical-media\"><strong>Physical Media<\/strong><\/h3>\n\n\n\n<p>Your friends, family and associates may unknowingly give you a disc or flash drive with an infected file on it. Don&#8217;t blindly accept these files; scan them with security software. If you are still unsure, do not accept the files.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-pop-up-window\"><strong>Pop-Up Window<\/strong><\/h3>\n\n\n\n<p>Some pop-up windows or boxes will attempt to corner you into downloading software or accepting a free &#8220;system scan&#8221; of some type. Often these pop-ups will employ scare tactics to make you believe you need what they are offering in order to be safe. Close the pop-up without clicking anything inside it (including the &#8220;X&#8221; in the corner). Close the window via Windows Task Manager (press Ctrl-Alt-Delete).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-another-piece-of-software\"><strong>Another Piece of Software<\/strong><\/h3>\n\n\n\n<p>Some programs attempt to install malware as a part of their own installation process. When installing software, pay close attention to the message boxes before clicking &#8220;Next,&#8221; &#8220;OK&#8221; or &#8220;I Agree.&#8221; Scan the user agreement for anything that suggests malware may be a part of the installation. If you are unsure, cancel the installation, check up on the programme and run the installation again if you determine it is safe.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-illegal-file-sharing-services\"><strong>Illegal File-Sharing Services<\/strong><\/h3>\n\n\n\n<p>You\u2019re on your own if you enter this realm. There is little quality control in the world of illegal software, and it is easy for an attacker to name a piece of malware after a popular movie, album or programme to tempt you into downloading it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-3-surf-smart\">3. Surf smart<\/h2>\n\n\n\n<p>Users should never enter user account, personal, financial, or other sensitive information on any web page at which they have not manually arrived. They should instead open a web browser, enter the address of the page they need to reach, and enter their information that way, instead of clicking on a hyperlink and assuming the link has directed them to the proper URL. Hyperlinks contained within an email message often redirect users to fraudulent, fake or unauthorized Web sites. By entering Web addresses manually, users can help ensure that they arrive at the actual page they intend.<\/p>\n\n\n\n<p>Use common sense while online. Finding something on the Internet does not guarantee that it is true. Anyone can publish information online, so before accepting a statement as fact or taking action, verify that the source is reliable. &nbsp;If it sounds too good to be true, it most likely is! You will not win the lottery and you will not be awarded an amazing prize on the Internet, so don\u2019t fall for this type of scam.<\/p>\n\n\n\n<p>Ignore emails or websites that promise you a great prize, as there is always a catch behind this type of promise.<\/p>\n\n\n\n<p>Completing a survey will not grant you an iPhone or $1000, instead it will give cyber criminals your personal details.<\/p>\n\n\n\n<p>In the unfortunate event that you do unwittingly download viruses or spyware, it is important to immediately take corrective action. First, disconnect from your network (Turn off your WI-FI or unplug your Ethernet cable) and immediately notify your system administrator. If you are responsible for your own system, then run a reputable anti-virus software scan on your system. By following these simple guidelines and steps, you will be well on your way to remaining a protected and savvy Internet user.<\/p>\n\n\n\n<p>Learn more about our Enterprise &amp; IT Consulting and IT Security Services by <a href=\"https:\/\/envistacorp.com\/contact\/\">contacting us<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Terri Cundiff outlines three sure fire ways to avoid computer viruses and spyware downloads.<\/p>\n","protected":false},"author":22,"featured_media":34675,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_searchwp_excluded":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[3475],"tags":[3913,3769,3519],"class_list":["post-43395","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cyber-security","tag-information-technology","tag-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Sure Fire Tactics to Avoid Viruses and Spyware - enVista<\/title>\n<meta name=\"description\" content=\"Terri Cundiff outlines three sure fire ways to avoid computer viruses and spyware downloads.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Sure Fire Tactics to Avoid Viruses and Spyware - enVista\" \/>\n<meta property=\"og:description\" content=\"Terri Cundiff outlines three sure fire ways to avoid computer viruses and spyware downloads.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/\" \/>\n<meta property=\"og:site_name\" content=\"enVista Australia\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-30T16:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-09T21:53:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/ets-3-surefire-tactics-to-avoid-viruses-whitepaper.png\" \/>\n\t<meta property=\"og:image:width\" content=\"675\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"enVista Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"enVista Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Sure Fire Tactics to Avoid Viruses and Spyware - enVista","description":"Terri Cundiff outlines three sure fire ways to avoid computer viruses and spyware downloads.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/","og_locale":"en_US","og_type":"article","og_title":"3 Sure Fire Tactics to Avoid Viruses and Spyware - enVista","og_description":"Terri Cundiff outlines three sure fire ways to avoid computer viruses and spyware downloads.","og_url":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/","og_site_name":"enVista Australia","article_published_time":"2014-07-30T16:55:00+00:00","article_modified_time":"2021-12-09T21:53:31+00:00","og_image":[{"width":675,"height":675,"url":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/ets-3-surefire-tactics-to-avoid-viruses-whitepaper.png","type":"image\/png"}],"author":"enVista Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"enVista Marketing","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/#article","isPartOf":{"@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/"},"author":{"name":"enVista Marketing","@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/person\/c938d19b1c760a4e1c353086018cb894"},"headline":"3 Sure Fire Tactics to Avoid Viruses and Spyware","datePublished":"2014-07-30T16:55:00+00:00","dateModified":"2021-12-09T21:53:31+00:00","mainEntityOfPage":{"@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/"},"wordCount":1120,"commentCount":0,"publisher":{"@id":"https:\/\/envistacorp.com\/en-au\/#organization"},"image":{"@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/#primaryimage"},"thumbnailUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/ets-3-surefire-tactics-to-avoid-viruses-whitepaper.png","keywords":["Cyber Security","Information Technology","Technology"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/","url":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/","name":"3 Sure Fire Tactics to Avoid Viruses and Spyware - enVista","isPartOf":{"@id":"https:\/\/envistacorp.com\/en-au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/#primaryimage"},"image":{"@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/#primaryimage"},"thumbnailUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/ets-3-surefire-tactics-to-avoid-viruses-whitepaper.png","datePublished":"2014-07-30T16:55:00+00:00","dateModified":"2021-12-09T21:53:31+00:00","description":"Terri Cundiff outlines three sure fire ways to avoid computer viruses and spyware downloads.","breadcrumb":{"@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/#primaryimage","url":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/ets-3-surefire-tactics-to-avoid-viruses-whitepaper.png","contentUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/ets-3-surefire-tactics-to-avoid-viruses-whitepaper.png","width":675,"height":675,"caption":"A man sitting at a desk in front of a laptop clenches his fists and grimaces in frustration. Papers, a cup, and a smartphone are on the desk, and bookshelves are in the background."},{"@type":"BreadcrumbList","@id":"https:\/\/envistacorp.com\/en-au\/2014\/07\/30\/3-tactics-to-avoid-viruses-and-spyware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/envistacorp.com\/en-au\/"},{"@type":"ListItem","position":2,"name":"3 Sure Fire Tactics to Avoid Viruses and Spyware"}]},{"@type":"WebSite","@id":"https:\/\/envistacorp.com\/en-au\/#website","url":"https:\/\/envistacorp.com\/en-au\/","name":"enVista Australia","description":"Enabling Enterprise Commerce","publisher":{"@id":"https:\/\/envistacorp.com\/en-au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/envistacorp.com\/en-au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/envistacorp.com\/en-au\/#organization","name":"enVista Australia","url":"https:\/\/envistacorp.com\/en-au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/logo\/image\/","url":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/10\/enVista_Logo_White-1.png","contentUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/10\/enVista_Logo_White-1.png","width":348,"height":152,"caption":"enVista Australia"},"image":{"@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/person\/c938d19b1c760a4e1c353086018cb894","name":"enVista Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","caption":"enVista Marketing"},"description":"enVista was founded by supply chain and technology experts in response to market demand for skilled consulting services. Read posts by our Thought Leaders.","url":"https:\/\/envistacorp.com\/en-au\/author\/envistamarketing\/"}]}},"_links":{"self":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/posts\/43395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/comments?post=43395"}],"version-history":[{"count":0,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/posts\/43395\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/media\/34675"}],"wp:attachment":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/media?parent=43395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/categories?post=43395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/tags?post=43395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}