Protect Your Computer from Viruses | Guidance

  • Protecting your computer from viruses is essential if you want to keep your data safe and your system running smoothly.
  • There are a few simple steps you can take to reduce the risk of infection and ensure that your computer is protected.

What is a Computer Virus

A computer virus is a code or program that can copy itself and infect a computer without the user’s knowledge or permission. A virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard drive.

And if you want to know about Lenovo laptops or shop accessories, or other buying guides, I’ve got you covered in my other articles as well.


Tips to Protect Your Computer From Viruses and Malware

Take steps to protect your computer from viruses and malware.

1. Use an Antivirus and Anti-Malware Program

Protecting your computer from viruses starts with a strong antivirus program that is kept up-to-date. You should also install an anti-malware program and scan your computer regularly. Be careful what you click on when you are online.

Windows has built-in virus protection called Microsoft Defender Antivirus. If you are using another antivirus program, make sure it is always up to date.

Open Microsoft Defender Antivirus in Windows 11:

  1. Click the Start menu. In the search bar, type “virus” and click Virus & threat protection.
  2. Under Current threats, you’ll see how many threats were found and removed in the last scan. If no threats were found, you’ll see a message that says “No active threats were found.”
  3. Under Virus & threat protection settings, click manage settings.
  4. Ensure Real-time protection and everything else is turned on.

Set up Automatic Scans

Windows Defender is set to run weekly by default, but you can schedule it to scan more often. To do this, open Windows Defender and find the “Scan Options” link, and select the time you would like for scans to run.

Windows Security Defender Antivirus

2. Keep Your Software up to Date

Make sure that your operating system and internet browser are up-to-date. Updates often include security features that can help protect your computer from new threats. It is easy to check for updates, just set them to install automatically.

Check for software updates in Windows 11:

  1. Click the Start menu. In the search bar, type “update” and click Check for updates.
  2. You can install or check for updates, as well as look at the update history.

3. Avoid Email Attachments from Unknown Senders

Email attachments can be a way for viruses to enter your computer. Be cautious about opening email attachments, even if they are from someone you know. Also, be careful what you download from the internet and only download files from trusted sources.

An email attachment will look like a regular file attached to an email. They can be in different formats like a PDF, image, or Microsoft Office document.

4. Backup Your Computer

Back up important documents and files to an external hard drive or cloud storage service. An example of cloud storage is Google Drive. That way, if your computer does get infected, you can restore your files.

To use Google Drive:

  1. Go to
  2. Sign in with your Google Account.
  3. Click New.
  4. Upload files and folders from your computer.

5. Use your Firewall

A firewall can help protect your computer from viruses and other malware by blocking malicious traffic before it reaches your computer. Windows has built-in firewall protection, or you can use another program like Norton Internet Security. It should be enabled by default but you can check by opening the Windows Firewall and making sure the “On” switch is selected.

6. Use Strong Protection

Strong protection includes good passwords and encryption. A password should be at least eight characters long and include a mix of uppercase and lowercase letters, numbers, and symbols. You should never use the same password at more than one site.

7. Use a Password Manager:

You can use a password manager to help keep track of your passwords and generate strong passwords. A password manager is a program that stores your passwords in an encrypted format.

ALSO READ: How To Use Public WiFi Safely | Advice



Malware is short for malicious software and is any software that is designed to harm your computer, steal personal information, or otherwise cause damage.

Some types of malware are viruses, spyware, Adware, Trojans, and rootkits.


A virus is a type of malware that can copy itself and spread to other computers. A virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard drive.


Spyware is a type of malware that can track your online activity and collect personal information, such as passwords, without your knowledge.


Adware is a type of malware that displays advertising on your computer, often in the form of pop-up ads.


A Trojan is a type of malware that masquerades as legitimate software but is actually designed to damage your computer or steal your personal information.


A rootkit is a type of malware that gives an attacker access to your computer and allows them to make changes without your permission.

What Are the Symptoms of A Computer Virus

So how do you know when you have a computer virus? Here are some common symptoms:

  1. Your computer is running slowly.
  2. Your internet browser’s homepage has changed without your permission.
  3. Pop-up ads appear when you’re not expecting them.
  4. You can’t access certain websites, or your internet connection is slower than usual.
  5. Files or programs won’t open.
  6. You see strange error messages.
  7. Your computer crashes or restarts on its own.
  8. You notice new, unknown files on your hard drive.

These are some of the more common issues you may see, but not all viruses display these symptoms. In some cases, a virus might do nothing more than replicate itself on your computer. In other cases, it might delete files or damage your hard drive.

How To Remove A Computer Virus

We now get to the difficult part, which is removing computer viruses. If you suspect that your computer has a virus, the best thing to do is run an antivirus program like Microsoft Defender or Norton Internet Security. You can also download a free tool by Malwarebytes to run an additional scan.

These programs will scan your computer for viruses and remove any that they find. Or else, they might be able to quarantine the virus to prevent it from spreading or infecting other files.

If you can’t access your antivirus program or if the virus is blocking it, you may need to boot your computer into Safe Mode. This will prevent the virus from running and allow you to remove it.

Tip: It is a good idea to create a USB virus scan tool beforehand so you have it ready if you ever need to use it. Create your own USB virus or malware scanner by following these steps:

  1. Download an antivirus program like Kaspersky Rescue Disk or Sophos Bootable Anti-Virus onto a clean computer.
  2. Connect a USB drive to the computer. You need at least a 1GB USB drive.
  3. Open the antivirus program and choose the option to create a bootable USB drive.
  4. Follow the instructions to create the bootable USB drive.
  5. Once the process is complete, disconnect the USB drive and connect it to your infected computer.
  6. Boot your infected computer from the USB drive.
  7. Once the program starts, follow the instructions to scan your computer for viruses and remove any that are found.

Alternatively, if you can still access Windows, run the Microsoft Defender Offline tool from Virus & threat protection page. This will reboot your computer and run its own scan.

JS Author Picture

J.S. is the owner, content creator, and editor at I’ve worked in the IT and Computer Support field for over 20 years. The server hardware in my computer labs has mostly been IBM, but I’ve supported Dell, HP, and various other hardware. In addition, as part of my lab administrator responsibilities, I’ve learned, supported, and repaired/upgraded network hardware such as Cisco routers and switches. READ FULL BIO >>

  • The ‘Real’ Truth About Laptop Performance: An Unconventional Guide
    Having trouble with a slow laptop that’s about as fast as a sloth stuck in quicksand? We’re going to dive into the nitty-gritty of laptop performance, showing you how to realize your device’s full potential. From the dangers of overheating and the importance of regular updates to the pitfalls of poor user habits, we’ve got you covered. So buckle up, and get ready … Read more
  • A Guide to Laptop Customization with Skins
    With technology increasingly shaping the way we interact with the world, our laptops have come to define us in many ways. They are our portals into the universe of the internet, helping us work, learn, create, and indulge in leisure activities. But how do we make this crucial extension of our personalities reflect our unique tastes and preferences? Enter laptop customization with personalized … Read more
  • Mastering Photo Editing: Best Laptops and Color Science
    In a world that’s more photographic than ever before, the art and science of photo editing have transcended its initial barriers, and now, everybody from seasoned professionals to enthusiastic hobbyists wants to master this skill. The key element to this is not just the software you use, but the hardware you carry. Understanding color science, the role of the monitor in photo editing, … Read more
  • Dell Showdown: Inspiron vs Latitude – A User’s Perspective
    When it comes to choosing a laptop from Dell, two of the most popular options are the Inspiron and Latitude series. Both offer powerful performance and sleek designs, but some key differences set them apart. As a technology enthusiast and a long-term Dell user, I’ve had the opportunity to explore various models within the Inspiron and Latitude lines. I understand the dilemma you … Read more
  • DISM Host Servicing Process: A Deep Dive
    Introduction I appreciate you joining me on this exploration of the DISM Host Servicing Process. You may be wondering, what exactly is the DISM Host Servicing Process? Well, it’s a core component of the Deployment Image Servicing and Management toolkit. It’s the mechanism that allows us to mount, repair, and service Windows images before they’re deployed. It’s like the maintenance space where we … Read more