Be mindful of what you are clicking on
Many websites that hosts harmful content will use banners and pop up advertisements, pretending to be an error messages or offering you a prize. When you visit these sites harmful content is downloaded into your computer. Avoid being tempted in the first place.
Be aware of what you are downloading
Don’t download software from a website that’s full of advertisements, or listings of ‘free’ programs, these are often fake files. Be cautious and question them, scan them with security software prior to opening or only download programs from reputable or corporate websites.
Be careful before you open your removable media
Many malicious programs attack your computers and spread via USB storage. USB Disk Security can protect your computer against any threats via removable media.
Update Windows when prompted
Microsoft release updates for Windows regularly. They include important security patches and tools. Install them when prompted to patch up security gaps in your operating system, browser or third party software.
Take extra care when using Peer-To-Peer programs
Since files shared on P2P networks are not policed. Anyone can release anything they want via this medium. As such get into the habit of scanning the files you downloaded before running/executing them.
Accept incoming files when you expect them and from people that you know
Some threats have the ability to infect machines and automatically send copies of themselves to that user's contact list. It may appear that your friend is sending you a file but it may turn out to be a malicious program propagating itself.
Know your File Formats
Images usually come in .jpg .jpeg .png .bmp .gif .tif formats. Executables come in .exe .bat .com .dll formats. If someone says they are sending you a photo but the file ends with .exe or .com, please do not open it. They’re obviously mistaken or potentially endangering you.
Be aware of what’s happening
There are various places to seek for help and learn more about your computer. It pays to be knowledgeable on your computer, as malicious threats often take advantage of those who are unaware of what’s happening.