Chapter 2: Secure Your Devices
Now that you’ve communicated w/your host, it’s time to ensure that all devices you’ll be using to log into & fix your website are secure & free from malware, i.e., viruses, worms, trojans, etc. It does little good to make your credentials beyond bulletproof only to have malware phone them home to a command-&-control server.
It’s wise to use more than one malware scanner, as not every program detects all variants of malware. At the same time, it’s unwise to have two malware scanners on your device that both detect in real-time. The thing to do is to use your real-time scanning program as well as to find an on-demand malware scanner. Be certain, however, that the malware scanner you get comes from an ethical source. There are plenty of “scareware” vendors out there, that is, those who will sell you a program that claims you’re infected when you’re not, simply so they can get your hard-earned cash for cleaning a problem that never existed to begin with. Since I’m assuming you already have real-time malware protection in place, here is a recent list of reputable, on-demand scanners.
Best Free Antivirus Software for 2018
Once you’re certain the device(s) you’ll be using to log onto your website are clean, it’s time to move onto the next step of ensuring the security of your network.
Pingback:How Do I Know If My Site's Been Hacked? - My Site's Been Hacked-Now What?