Up to now my security suite consists of...
Behind router:
Bit Defender Free
Windows Firewall
Malwarebytes Free
SUPERAntiSpyware Free
KeyPass for my passwords
I'm considering moving up to a paid version of Bit Defender and I was wondering what the general consensus is and if going to a "paid" version of any antivirus is recommended?
Thinkin of purchasing an AntiVirus suite
I have Bit Defender Free on one of my machines, but mostly just use MSE/Windows Defender lately, and run periodic malware scans with MBAM, ADWcleaner, etc.
I don't know about a consensus
, but in my opinion, user behavior is more important than the brand of antivirus: all antivirus programs will miss something in the long run. Also, many of the paid antivirus programs out there try to do too much (malware/email/website protection, cookie cleaning etc.) and get quite resource-heavy without much added benefit for normal home use over the default MS version. Of course, if you have other users that tend to install unknown software/browser extensions and click around dubious websites, it's a different story.
I don't know about a consensus

- YeOldeStonecat
- SG VIP
- Posts: 51171
- Joined: Mon Jan 15, 2001 12:00 pm
- Location: Somewhere along the shoreline in New England
We primarily use BitDefender for the majority of our business clients, the version that N-Able (our RMM tool) integrates. We have about 4,000 installs out there. Great product. Just the antivirus....I have the content filter disabled in my standard profiles. It has been one of the top 3x AV products at AV-Comparatives for several years now....frequently getting top spot.
We also resell Eset, and used to use Kaspersky sometimes.
Years ago, user behavior was a primary factor. "Stay off those porn sites" was often heard. But these days, the majority of infections come from casual web surfing on common every day websites. Websites that have streaming advertisements. the malware guys get "poisoned ads" into the subscription stream...and by the time the "bad ad" is found...thousands of viewers likely tripped across it. These ads usually take advantage of exploits in the "web players". Java, Adobe Flash, Adobe Shockwave, Quicktime viewer, Adobe PDF reader (lots of websites use PDF conversion within the browser).
These ads, like I said, are every day common websites. Your local newspaper. Various forums. Social media sites.
I take a "layered approach" to security for our clients.
*maintain Microsoft updates. Your computer is more likely to shrug off a virus like water off a ducks back if it's up to date. Lots of malware tries to exploit security flaws in Windows (and MS Office) that has been patched. An unpatched computer is much more likely to get infected than a patched computer
*maintain your 3rd party web player updates...same logic as above.
*Use a browser that is more resistant to malware. I'm a big fan of Google Chrome...is has a built in "sand box". It runs sessions within a sandbox that cannot reach out and touch the operating system. Often if you come across a malware ridden website using Google Chrome..and malware jumps up and takes over your screen...all you have to do is get Chrome shut down (task mangler..or just force shut down your computer)...and you're often not infected. I've seen this many times myself. Even on my own laptop. The malware stays kept in that padded room and flushed down the toilet.
*Use ad blockers. Common sense. Advertisements are big sources of infections. Stop them...you eliminate a big vector of infection.
*Use Safe DNS services. Such as OpenDNS. There are a few other safe DNS services also. But they block known malware distribution sites via a constantly updated list. When you come across malware..typically it's just a stub downloader that gets on computer...gets activated..it turns around and actually downloads the payload of the malware. Sometimes the minute you stumble on it...other times...a day...or a week...or a month later. or more. With safe DNS services...your computer cannot download what it can't resolve. many times I've found stub downloader files...but the rest of the malware never came down, the computer never really got the infection. Wasn't able to download the rest of the malware.
So as for antivirus brand...of course there are fanboys of certain brands, similar to video cards. (except there are a heck of a lot of players in the AV world). I use AV-Comparatives.org for reviews, it's the only review/test site I like. Pick a consistently high scoring product...one that has done well for years. The best ones average around 97-99% effectiveness. But complement them with the above things....updates, safe DNS, ad blocking, secure browser.
I also put UTM firewalls at our clients...those add additional AV scan engines for all web based traffic, as well as other attack blockers and anti malware technologies. But I realize those are above budget for residential users. Unless you like to fiddle with hardware and linux distros. Untangle is my favorite.
We also resell Eset, and used to use Kaspersky sometimes.
Years ago, user behavior was a primary factor. "Stay off those porn sites" was often heard. But these days, the majority of infections come from casual web surfing on common every day websites. Websites that have streaming advertisements. the malware guys get "poisoned ads" into the subscription stream...and by the time the "bad ad" is found...thousands of viewers likely tripped across it. These ads usually take advantage of exploits in the "web players". Java, Adobe Flash, Adobe Shockwave, Quicktime viewer, Adobe PDF reader (lots of websites use PDF conversion within the browser).
These ads, like I said, are every day common websites. Your local newspaper. Various forums. Social media sites.
I take a "layered approach" to security for our clients.
*maintain Microsoft updates. Your computer is more likely to shrug off a virus like water off a ducks back if it's up to date. Lots of malware tries to exploit security flaws in Windows (and MS Office) that has been patched. An unpatched computer is much more likely to get infected than a patched computer
*maintain your 3rd party web player updates...same logic as above.
*Use a browser that is more resistant to malware. I'm a big fan of Google Chrome...is has a built in "sand box". It runs sessions within a sandbox that cannot reach out and touch the operating system. Often if you come across a malware ridden website using Google Chrome..and malware jumps up and takes over your screen...all you have to do is get Chrome shut down (task mangler..or just force shut down your computer)...and you're often not infected. I've seen this many times myself. Even on my own laptop. The malware stays kept in that padded room and flushed down the toilet.
*Use ad blockers. Common sense. Advertisements are big sources of infections. Stop them...you eliminate a big vector of infection.
*Use Safe DNS services. Such as OpenDNS. There are a few other safe DNS services also. But they block known malware distribution sites via a constantly updated list. When you come across malware..typically it's just a stub downloader that gets on computer...gets activated..it turns around and actually downloads the payload of the malware. Sometimes the minute you stumble on it...other times...a day...or a week...or a month later. or more. With safe DNS services...your computer cannot download what it can't resolve. many times I've found stub downloader files...but the rest of the malware never came down, the computer never really got the infection. Wasn't able to download the rest of the malware.
So as for antivirus brand...of course there are fanboys of certain brands, similar to video cards. (except there are a heck of a lot of players in the AV world). I use AV-Comparatives.org for reviews, it's the only review/test site I like. Pick a consistently high scoring product...one that has done well for years. The best ones average around 97-99% effectiveness. But complement them with the above things....updates, safe DNS, ad blocking, secure browser.
I also put UTM firewalls at our clients...those add additional AV scan engines for all web based traffic, as well as other attack blockers and anti malware technologies. But I realize those are above budget for residential users. Unless you like to fiddle with hardware and linux distros. Untangle is my favorite.
MORNING WOOD Lumber Company
Guinness for Strength!!!
Guinness for Strength!!!
Thanks for the help.
I have been using OpenDNS for some time. Along with all my other precautions I've felt relatively secure. What bothers me the most is how the whole computing landscape is changing. I'm also troubled how the new Win 10 seems to be tied to the MS App store etc. It really seems like they're trying to monitor things they never did before. I don't mind being connected and I don't mind people knowing a certain amount about my computer behavior but I'd really like to be the person making that decision.
I have been using OpenDNS for some time. Along with all my other precautions I've felt relatively secure. What bothers me the most is how the whole computing landscape is changing. I'm also troubled how the new Win 10 seems to be tied to the MS App store etc. It really seems like they're trying to monitor things they never did before. I don't mind being connected and I don't mind people knowing a certain amount about my computer behavior but I'd really like to be the person making that decision.
- YeOldeStonecat
- SG VIP
- Posts: 51171
- Joined: Mon Jan 15, 2001 12:00 pm
- Location: Somewhere along the shoreline in New England
Yeah..."recurring revenue" is the model here.
Microsoft is ramping up Defender again...check this out..
http://www.neowin.net/news/microsoft-an ... protection
Microsoft is ramping up Defender again...check this out..
http://www.neowin.net/news/microsoft-an ... protection
MORNING WOOD Lumber Company
Guinness for Strength!!!
Guinness for Strength!!!