5 Things to Know When Selecting Security Software

March 24, 2014 | By Editor
1 Star2 Stars3 Stars4 Stars5 Stars

Internet SecurityNow more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus for pc is a key step in defending against cyberthreats

New malware is created everyday, and hackers have grown more sophisticated – logging hours of time following social media sites to engineer new forms of hacking attacks against consumers. There are nearly as many choices when it comes to Internet Security protection – and the decision could have a major impact on a user’s privacy and the performance of his or her computer.

When you consider the increased threat of a virus or a hack with the increased amount of information the average computer user shares electronically – bank account numbers, credit card data, professional and personal contacts, family photos and information – deciding what security measures to take becomes as, if not more important, than deciding between a Mac and a PC,” said Melih Abdulhayoglu, Comodo’s CEO and chief security architect.

With this in mind, Comodo offers consumers some basic background – in the form of tips and educational videos – that will help them make more informed choices.

Here are five things Comodo believes consumers should know before they select security software.

  • Cleaning and protecting are not the same – Ridding an infected PC of malware is not the same as protecting a clean PC from potential threats. Many Internet security vendors claim their software works in both scenarios, but that is not the case. Just as vitamins are designed to prevent illness and antibiotics are designed to cure illness, the software that cleans an infected computer is not the best solution for protecting a computer. Do not confuse cleaning tools with antivirus protection. This distinction is explained in a Comodo video titled “Virus Protection vs. Virus Cleaning”
  • Much of the antivirus software on the market was developed in the 1980s – Chances are you’re no longer using the same luggable PC or CPU tower you bought in the 80s, so why would you rely on the same security created 30 years ago, when solutions began focusing on protecting the user from published “blacklists” of known malware? You wouldn’t assume a stranger is trustworthy and invite them into your house just because their face isn’t on the FBI Most Wanted list, yet many computer users are doing just that when they trust their security to ‘default-allow’ software that grants access to unknown files. Consumers should look for Internet Security Software that relies on “default-deny” technology which scans all unknown applications before allowing them into your system.
  • Pop-up alerts are easier to manage than trojans, spyware and hacks – Leading security technology relies on auto sandbox technology that restricts the ability of potential viruses to run even before they become identified as a threat, but few solutions use this approach. With sandboxing, unrecognized files and applications are set aside and not allowed access to a user’s computer until they are identified as safe – or if found to be a threat, denied access. These unknown files are sandboxed so that they cannot do any harm to your system. Some industry analysts consider antivirus software with sandboxing an inconvenience because the program will send users pop-up messages alerting them when good or infected files are located, but savvy computer users understand x-ing out of a pop-up alert is far easier than losing critical and confidential information from a cyberattack. This approach is spotlighted in a Comodo video titled, appropriately, the “Good, the Bad and the Unknown.”
  • Not all reviews are complete and unbiased – For years, consumers have looked to “industry experts” for advice when considering which Internet security software to use, but here again, the choice they make – on what review or reviewer to consider – can make a big difference in how well they are protected. Consumers should educate themselves on how software reviewers determine a software program’s rating. Some testing labs aren’t able to adequately review approaches like autosandboxing or are subject to the same traditional “default allow” prejudices of the solution providers themselves. In some cases, the connection between reviewers and vendors is even more questionable, with reviewers requiring software manufacturers to pay a fee for a review and forbidding the solution provider from revealing the relationship.
  • Consider insights from other consumers – While many industry ratings and reviews may be valuable, consumers should also consider real-world reviewers – like other, knowledgeable users – who offer unsolicited and unbiased opinions on YouTube, Facebook, blogs, forums and other places online.
Be Sociable, Share!


    Aggravatorx March 24, 2014 at 10:05 pm

    It should be 6 things all above is true but you forgot the most important one of them all

    THE USER think before you click

      Kevin Judge March 25, 2014 at 9:02 pm

      That is so true, but I know I occasionally make that mistake myself.
      You have to be very careful when running installations that you don’t install junk such as browser hijackers.
      While you can’t go wrong with Comodo free antivirus, a lot of other free software are not what the pretend to be.

    Francesco March 26, 2014 at 8:13 am

    Yes, the most important thing is the user’s brain. In the same way you do not let a stranger into your house, you should avoid starting unknown programs. Besides this, there is Comodo and the default deny architecture! 😉

    Aggravatorx March 26, 2014 at 9:17 am

    agreed so many anti virus programs out there is a joke more of them have more bloatware.I notice when friends and family download they dont realize the other checkmarks of toolbars and programs included and homrpage changing and your righi on Comodo is one of the most people friendly programs out there thats another good idea comodo should have on there security site web pages of good and trusted download sites for the consumers like filehippo ect


    Add new comment

    Your name

    You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


    What Hidden Threats LurkOn Your Endpoints?

    Get complete security from known and unknown threats from Comodo Endpoint Protection

    free threat scan