{"id":21,"date":"2021-07-16T19:15:00","date_gmt":"2021-07-16T19:15:00","guid":{"rendered":"https:\/\/www.cpsmi.com\/blog\/?p=21"},"modified":"2022-06-29T14:41:50","modified_gmt":"2022-06-29T14:41:50","slug":"protecting-yourself-from-computer-viruses-malware-ransomware","status":"publish","type":"post","link":"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/","title":{"rendered":"Protecting Yourself from Computer Viruses, Malware, Ransomware"},"content":{"rendered":"\n<p>Computer hackers are everywhere these days \u2013 literally. These engineers can implant a \u201cvirus\u201d in your computer that can wreak havoc on your personal information. From your program files to your bank account, viruses can infiltrate nearly every aspect of your computer. Hackers are almost always looking for ways to penetrate your security. People often disregard their device\u2019s defenses, realizing their importance after it\u2019s too late.<\/p>\n\n\n\n<p>A computer virus is a code embedded into a legitimate program data file or boot sector of a hard drive created with the ability to self-replicate, infecting other applications. Intended to spread from one \u201chost\u201d to another, these computer-targeted viruses come from e-mail attachments, file downloads, software installations, unsecured links, and more. But what do the hackers gain from accessing your computer? Your personal data is typically most valuable, such as passwords, social media accounts, online banking, and even deleting all your data. So, what are some different virus expressions?<\/p>\n\n\n\n<p><strong>Malware:<\/strong>&nbsp;Short for&nbsp;malicious software, this could harm a computer system, interfere with user data, or make the computer perform actions remotely.<\/p>\n\n\n\n<p><strong>Ransomware:<\/strong>&nbsp;A type of malware that holds entire computers or mobile devices hostage, requesting a ransom payment in exchange for returning access, or decrypting your files.<\/p>\n\n\n\n<p><strong>Worm:<\/strong>&nbsp;A standalone piece of software, this malicious program duplicates itself and circulates to other computers. Vulnerable computer networks are usually most susceptible.<\/p>\n\n\n\n<p><strong>Trojan Horse:&nbsp;<\/strong>This type of malware uses a specific code to install software that appears okay but is hidden to create an alternative entry into a system. Data theft or loss is usually the goal.<\/p>\n\n\n\n<p><strong>Spyware:<\/strong>&nbsp;The main goal of this virus is to gather information about you, your organization, family, or more. Running inconspicuously, it can monitor and log any activity on a target system such as keystrokes, credit card information, and more.<\/p>\n\n\n\n<p><strong>Adware:<\/strong>&nbsp;To generate revenue for its author\/publisher, this software causes pop-ups, banner advertisements, and more. Free programs often utilize Adware, but not in a cruel way. If it is used with a destructive intention, it is instead classified as spyware or malware.<\/p>\n\n\n\n<p>To protect yourself from computer viruses, avoid clicking on suspicious or lengthy links, pop-ups, or unfamiliar websites. Scan all e-mail attachments, download a pop-up blocker for your browser, and install an anti-virus program.<\/p>\n\n\n\n<p><strong>Have you been hacked? Do you need assistance preparing your computer for virus prevention? Prevention is the best policy! Contact the computer virus experts at CPS today to strategically remove, prevent, and protect your computer from viruses.<\/strong><\/p>\n\n\n\n<p>Founded in 1994,\u00a0Creative Programs and Systems\u00a0provides professional results for all computer needs. We design, create, and code an array of custom software programs and websites; offer top-notch digital marketing services including enhanced Search Engine Optimization (SEO) and paid advertising; repair and provide support for computers of both residential and professional nature; build custom systems and servers, and offer secure data backups. Need assistance or want to learn more? Call us at\u00a0<a href=\"tel:1-810-224-5252\">810-224-5252<\/a>\u00a0or e-mail\u00a0<a href=\"mailto:info@cpsmi.com\">info@cpsmi.com<\/a>.<\/p>\n\n\n\n<p><em>Written by the digital marketing staff at Creative Programs &amp; Systems:\u00a0www.cpsmi.com.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer hackers are everywhere these days \u2013 literally. These engineers can implant a \u201cvirus\u201d in your computer that can wreak havoc on your personal information. From your program files to your bank account, viruses can infiltrate nearly every aspect of your computer. Hackers are almost always looking for ways to penetrate your security. People often&#8230;<\/p>\n","protected":false},"author":1,"featured_media":22,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Yourself from Computer Viruses, Malware, Ransomware -<\/title>\n<meta name=\"description\" content=\"Protecting Yourself from Computer Viruses, Malware, Ransomware -\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Yourself from Computer Viruses, Malware, Ransomware -\" \/>\n<meta property=\"og:description\" content=\"Protecting Yourself from Computer Viruses, Malware, Ransomware -\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-16T19:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-29T14:41:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cpsmi.com\/blog\/wp-content\/uploads\/2021\/08\/CPS-NS1-7-21-POSTED.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cps_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cps_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/\",\"url\":\"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/\",\"name\":\"Protecting Yourself from Computer Viruses, Malware, Ransomware -\",\"isPartOf\":{\"@id\":\"https:\/\/www.cpsmi.com\/blog\/#website\"},\"datePublished\":\"2021-07-16T19:15:00+00:00\",\"dateModified\":\"2022-06-29T14:41:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.cpsmi.com\/blog\/#\/schema\/person\/1cd8be06ab0ee33fe8de477eea6dc8cb\"},\"description\":\"Protecting Yourself from Computer Viruses, Malware, Ransomware -\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cpsmi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Yourself from Computer Viruses, Malware, Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cpsmi.com\/blog\/#website\",\"url\":\"https:\/\/www.cpsmi.com\/blog\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cpsmi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cpsmi.com\/blog\/#\/schema\/person\/1cd8be06ab0ee33fe8de477eea6dc8cb\",\"name\":\"cps_admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cpsmi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bd7268ab89eacb83f4625942bea304a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bd7268ab89eacb83f4625942bea304a5?s=96&d=mm&r=g\",\"caption\":\"cps_admin\"},\"sameAs\":[\"https:\/\/www.cpsmi.com\/blog\"],\"url\":\"https:\/\/www.cpsmi.com\/blog\/author\/cps_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Yourself from Computer Viruses, Malware, Ransomware -","description":"Protecting Yourself from Computer Viruses, Malware, Ransomware -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Yourself from Computer Viruses, Malware, Ransomware -","og_description":"Protecting Yourself from Computer Viruses, Malware, Ransomware -","og_url":"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/","article_published_time":"2021-07-16T19:15:00+00:00","article_modified_time":"2022-06-29T14:41:50+00:00","og_image":[{"width":800,"height":512,"url":"https:\/\/www.cpsmi.com\/blog\/wp-content\/uploads\/2021\/08\/CPS-NS1-7-21-POSTED.jpg","type":"image\/jpeg"}],"author":"cps_admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cps_admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/","url":"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/","name":"Protecting Yourself from Computer Viruses, Malware, Ransomware -","isPartOf":{"@id":"https:\/\/www.cpsmi.com\/blog\/#website"},"datePublished":"2021-07-16T19:15:00+00:00","dateModified":"2022-06-29T14:41:50+00:00","author":{"@id":"https:\/\/www.cpsmi.com\/blog\/#\/schema\/person\/1cd8be06ab0ee33fe8de477eea6dc8cb"},"description":"Protecting Yourself from Computer Viruses, Malware, Ransomware -","breadcrumb":{"@id":"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cpsmi.com\/blog\/protecting-yourself-from-computer-viruses-malware-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cpsmi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting Yourself from Computer Viruses, Malware, Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.cpsmi.com\/blog\/#website","url":"https:\/\/www.cpsmi.com\/blog\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cpsmi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cpsmi.com\/blog\/#\/schema\/person\/1cd8be06ab0ee33fe8de477eea6dc8cb","name":"cps_admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cpsmi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bd7268ab89eacb83f4625942bea304a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd7268ab89eacb83f4625942bea304a5?s=96&d=mm&r=g","caption":"cps_admin"},"sameAs":["https:\/\/www.cpsmi.com\/blog"],"url":"https:\/\/www.cpsmi.com\/blog\/author\/cps_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/posts\/21"}],"collection":[{"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":2,"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/posts\/21\/revisions"}],"predecessor-version":[{"id":542,"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/posts\/21\/revisions\/542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/media\/22"}],"wp:attachment":[{"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/media?parent=21"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/categories?post=21"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cpsmi.com\/blog\/wp-json\/wp\/v2\/tags?post=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}