Defensive computing

An important defensive computing strategy is to seek and implement quality firewall software that filters both inbound and outbound traffic.

[3] It is important for defensive users to use to anti-malware that is both effective and easily updated in order to combat new strains of malicious software that are developed.

When monitoring emails anti-malware opens all attachments for analysis, a bug in this scanner can be used as a starting point for malware.

Ex Mozilla developer Rober O'Callahan writes in his blog that anti malware software should be disabled (except windows defender)[5] An important aspect of defensive computing is for users to be skeptical of the data to which they have access via the Internet.

Defensive users think critically about the information they can access, to reduce their chances of downloading and spreading malicious software.

Despite the efforts of a defensive computer user, the loss of important data can occur due to malware, power outages, equipment failure and general misuse.

Users can make multiple copies of important data and store them either on the same computer or on another device such as a compact disc or an external hard drive.

Some operating systems give users the option of performing a procedure that restores a computer to a predetermined state.