50 Dos and Don’ts of Internet Security for the Year 2015!

  • 1
    Share

This post is to say thank you to all the fans and readers of Quick Heal blog with a recap of some of the most important dos and don’ts of Internet Security. Read on.

Dos and Don'ts of Internet Security for the year 2015

The first official post on our blog was live on October 19th, 2006. And since then, we have been diligently striving to keep you updated with the latest happenings in the computer security world. As we are just a couple of days away from welcoming yet another new year, we would like to thank all our fans, readers, and followers for their readership and contribution to this blog. And as a thank you note, we are recapping one of our most commented and read posts – The Dos and Don’ts of Internet Security. We hope that the following tips help enhance your digital experience for the coming year.

Dos and Don’ts of Internet Security

#1. While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.
#2. Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.
#3. Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts.
#4. Enable Secure Browsing for your Facebook account.
#5. Keep your computer’s Firewall ON
#6. Avoid making your personal information public on social media sites and Internet in general.
#7. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.
#8. Use your primary email address to stay in touch with people you know or are acquainted with.
#9. Never use your official email address for social media sites.
#10. For social media sites, use an email address that you do not use for important communications.
#11. Tighten your privacy settings on Facebook so that only your friends are notified about your activity.
#12. Never use any of your personal information such as name, date of birth, address, etc., as your password.
#13. While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure no one’s snooping on you.
#14. Never trust emails asking for your personal or banking information. Be extra cautions against links or attachments in unknown or unwanted emails. Verify any such communication with the sender first.
#15. Do away with old accounts that you do not use anymore.
#16. Do not make your photos or videos public on social media sites. Keep them visible to friends you know, and your family.
#17. Never respond to pop up ads that may come up on your screen. Close such pop ups from the task manager; press Alt+Ctrl+Delete.
#18. Before downloading any free software, research on the software and the website hosting it.
#19. Avoid visiting inappropriate websites or websites that you are not fully aware of.
#20. Beware of files with multiple extensions.
#21. Always log out of online accounts when you are done. This is especially important when you are using a public computer.
#22. Do not click or share posts on Facebook that claim to show any unusual content such as shocking videos or magical illusions. Verify such news from other sources.
#23. Access your bank’s website by manually typing its URL in the address bar.
#24. Do not click any links in emails to access your bank’s website.
#25. Keep your software and operating system up-to-date.
#26. Do not install software that comes as an attachment in emails.
#27. Always shop from reputed and know online stores.
#28. Update the Internet browsers and software on your computer.
#29. Use up-to-date security software that offers multilayered protection.
#30. Increase your awareness of cyber security and share the same with friends and family.
#31. Avoid online shopping on public computers or networks.
#32. If you are buying from an online website for the first time, do a little research about the site and go through its privacy policies.
#33. Change your Internet banking passwords at periodical intervals and never share them with anyone.
#34. Avoid saving your credit/debit card information on websites and web browsers.
#35. Never share your financial details on phone or email, even if the caller/sender seems genuine. Remember, people in cyberspace are not always what they seem to be.
#36. Avoid downloading software from unverified publishers.
#37. Always lock your computer when not in use. Do not leave it unattended, especially in public places.
#38. Keep passwords that have a mix of uppercase and lowercase letters, numbers, special characters, and are at least 8 characters long.
#39. Avoid public networks for accessing websites that require you to sign in to access any information.
#40. If you store any critical information such as social security number, credit card number, bank account details, passwords, etc., in external storage devices, ensure that the data is encrypted.
#41. Accept friend requests only from people you know and have met with in person.
#42. Treat an online stranger in the same way as you would treat a stranger in the real world.
#43. If you suspect that a message from a friend is fraudulent or strange, call or meet the friend to discuss it.
#44. Protect your device with a screen lock. Turn the automatic screen lock function ON.
#45. Don’t root or jailbreak your device. It will make your device vulnerable to attackers.
#46. Install apps only from trusted and official sources.
#47. Turn OFF Wi-Fi, Location Services and Bluetooth when not in use.
#48. Avoid sending or saving personal & overly sensitive information on your mobile device.
#49. Avoid mobile apps that ask for unnecessary permissions.
#50. Install a mobile security app with features such as Anti-malware, Anti-theft, Call & SMS filter, Privacy Protection and Remote Device Management.

And that would be all for the top 50 dos and don’ts of Internet security that will protect you from online threats and hackers this year and the years to come. Have A Happy and Splendid New Year 2015!

Use the comment space below to leave us your choice for the following options:

a) You follow all of these dos and don’ts

b) You follow some of them

c) You follow none of them

d) You will start following them now

Rajiv Singha

Rajiv Singha


260 Comments

Leave a Reply to gautam Cancel reply

Your email address will not be published.

CAPTCHA Image

  1. I follow some of them and I will start following all of them now…Thank you !!

    Reply
    • Avatar Mukundan KrishnayFebruary 18, 2014 at 9:19 PM

      Thank you so much for the invaluable information. I will start following all of the golden essentials of Internet safety. I feel highly obliged for this most wanted awareness.

      Reply
    • I’ll follow some of these.thank you for your suggestion ………now i will try to following all of these…….

      Reply
  2. Avatar Ishan MahajanFebruary 18, 2014 at 6:40 PM

    Im following most of the steps… But i start following all of them… Thnks for the information.

    Reply
  3. i follow all these dos and dont’s

    Reply
  4. Avatar Jagdish K Meshram. Adv.February 18, 2014 at 7:47 PM

    Better suggestions for network users…….. thanks for tips.

    Reply
  5. Avatar Jagdish K Meshram. Adv.February 18, 2014 at 7:52 PM

    internet security !! is protecting beauty !! if injury causes recover with Quick , applying Quick heal it up that beauty of internet security.

    Reply
  6. Use most of them but still act careless during some situations. Nice info for fresher’s.

    Reply
  7. I follow all of them. Thank you.

    Reply
  8. Highly recommended for all internet users.!

    Reply
  9. Avatar KAILASH SAMALFebruary 18, 2014 at 9:25 PM

    Thanks. You follow all of these dos and don’ts

    Reply
  10. I follow most of them

    Reply
  11. Wonderful information; you’ve put almost everything at one place, if anyone follows all these safety instructions then there’re actually very fewer chances of them being vulnerable online.

    I myself have put QuickHeal Total Security on several computers and recommended many people to use it.

    Reply
  12. I follow some of them and I will start following all of them now…Thank you !!

    Reply
  13. Wonderful information; you’ve put almost everything at one place, if anyone follows all these safety instructions then there’re actually very fewer chances of them being vulnerable online.

    I myself have put QuickHeal Total Security on my computers and recommended many people to use it.

    Reply
  14. Its more help full tips. Thanks

    Reply
  15. Avatar Meraj Uddin KhanFebruary 18, 2014 at 11:05 PM

    I am already using almost all of the suggested tip. But anyways thanks a lot.

    Reply
  16. I follow most of these DOs and DON’Ts for the Internet Security and will try
    to follow more DOs and DON’T as per necessity. Your guidelines in connection with the Internet Security are very much helpful to the Internet users. I am using QH Total Security 2014 and it is working very effectively and now I have no tension for my computer’s security. Please keep on helping us in this way.

    Reply
  17. A good and useful information. I have prcticed some of these but would be careful on other details as well. Thanks

    Reply
  18. Avatar SUBHAS C KARMAKAARFebruary 19, 2014 at 12:03 AM

    I follow most of them and I will try to follow all of them now. Thanks for valuable guidelines.

    Reply
  19. I follow some of them I will try to follow all of them …thank you

    Reply
  20. Avatar JD KACHHADIYA (Bagdana)February 19, 2014 at 12:52 AM

    I follow some of them and I will start following all of them now…Thank you !!

    onderful information; you’ve put almost everything at one place.

    Reply
  21. Avatar chandrakant kulkarniFebruary 19, 2014 at 1:20 AM

    Thank you very much for your most valuable advice, sir!
    I was following some of your instructions – but I will now follow ALL OF THEM from nowonwards.
    Thanking you again,
    Chandrakant.

    Reply
  22. Avatar Dr Ashok K SharmaFebruary 19, 2014 at 6:52 AM

    Despite being and IT/MIS manager I found some more saftety tips I was usually ignoring..Now a big NO for such stupidity. I am a proud Quick Heal Products supporter since almost 12 years..

    Reply
  23. Thanks these do’s and don’ts a revert important and most secured way to handle day to day transactions over net. Some were really new for me and I really use some of them

    Reply
  24. Avatar ANIRBAN CHAUDHURIFebruary 19, 2014 at 9:14 AM

    I follow some of them and I will start following all of them now…Thank you !!

    Reply
  25. Avatar G.N.S. ADINARAYANA RAOFebruary 19, 2014 at 9:16 AM

    I am following most of the them and I will start to follow the remaining one or two also. Thank you very much for valuable information.

    Reply
  26. I Follow some of them and will definitely try to follow all. Thank you Quickheal team. I trust you and appreciate your awareness Initiative.

    Reply
  27. yes, its very useful, i follow some of the above mentioned, in future i follow the all for secure & safety banking, thanking yaar..

    Reply
  28. Avatar Chirag PrajapatiFebruary 19, 2014 at 10:19 AM

    Such a usefull Information.

    Reply
  29. I will follow some of them.

    Reply
  30. Avatar Debabrata Saha.February 19, 2014 at 10:52 AM

    Thanks for the information,I will follow all of them.

    Reply
  31. thanks for your advice and i will surely follow this

    Reply
  32. Avatar pazua dolibsw lorecneFebruary 19, 2014 at 11:12 AM

    great thanks should share this

    Reply
  33. follow some of them, start following all of them.

    Reply
  34. Thanks. I follow some of them, but now I will follow them all.

    Reply
  35. a,
    Excellent list of tips for internet user. Thanks

    Reply
  36. Avatar Kushal MukhotiFebruary 19, 2014 at 2:17 PM

    On item no.23.
    Should we type the URL manually every time in the address bar? Is it not safe to click the URL that is saved in the ‘favorite / bookmark ?”

    Kushal

    Reply
    • Rajiv Singha Rajiv SinghaFebruary 19, 2014 at 4:18 PM

      Hello Kushal Mukhoti,

      There are certain malware that can change the settings of your Internet browser. But, if your computer is well protected, then you can access sites from saved bookmarks. However, this practice of manually typing the URL is recommended for accessing sites which deals with monetary transactions.

      Regards,

      Reply
  37. Thank u

    Reply
  38. b….wil try to follow all of them…good article…Thank you.

    Reply
  39. Yes,I am follow the do”s and donot”.Thank you.

    Reply
  40. Avatar Murali KrishnaFebruary 19, 2014 at 3:48 PM

    I follow some of them indicated above. I start follow the remaining. Thank you very much for your valuable suggestions.

    …MK

    Reply
  41. I follow most of these instructions

    Reply
  42. I follow all the do and don’ts

    Reply
  43. Thanks for the valuable information,
    I follow most of them…
    and i will follow the remaining once from now onwards,

    Can u provide more tips and tricks on this topic?

    Reply
  44. Avatar Dibya Jyoti Nath.February 19, 2014 at 7:17 PM

    Some points I did not do. I’ll do from right now…
    Thanks…

    Reply
  45. How to block popups in Mozilla Firefox browser?

    Reply
    • Hello Bp,

      Kindly follow the steps given below to block popups in Mozilla Firefox:

      1. Open the browser
      2. At the top of the Firefox window, click Tools and then select Options
      3. Select the Content tab
      4. Check the box against Block pop-up windows

      For more information, please visit Block popups in Firefox

      Regards,

      Reply
  46. i use some of them but now surely i will abide by it.

    Reply
  47. Avatar Vinay PrasadFebruary 19, 2014 at 9:02 PM

    I will start following these steps from today.

    Thanks & Regards,
    Vinay Prasad

    Reply
  48. Avatar Vijay DeshmukhFebruary 19, 2014 at 9:36 PM

    I follow most of them, but not all.
    Sure, I will take it seriously.

    Thanks.

    Reply
  49. follow all to avoid any risk.

    Reply
  50. Avatar sandeep singhFebruary 19, 2014 at 11:08 PM

    follow some of them

    Reply
  51. Avatar sandeep singhFebruary 19, 2014 at 11:10 PM

    lots of thnx sir….nw frm onwards i’ll follow all the necessary steps….

    Reply
  52. Option b

    Reply
  53. I am follow all of these dos and don’ts

    Reply
  54. I do follow most of the practices but not all. Very usefull safety tips, thanks.

    Reply
  55. I m following it.

    Reply
  56. I will br try to follow them but I must follow some from them
    THANK YOU

    Reply
  57. Very usefull safety tips, thanks.

    Reply
  58. I follow most of them …. with Quick Heal on I know I am safe almost all the time.

    Reply
  59. Yes I follow all of them.

    Reply
  60. Avatar rajesh sonaraFebruary 20, 2014 at 10:42 AM

    really nice….. keep advising….thanks

    Reply
  61. I have heard that we should not download any antivirus from the net, nor should we copy it from any other source rather than purchasing the software. Is it true? Why is it so?

    Reply
  62. Avatar Amjadh Khan CKFebruary 20, 2014 at 2:32 PM

    I Better Follow Them Now..!

    Reply
  63. on item no:20

    hello Rajib sir !! how to know in advance that a file is having multiple extensions before we open it??

    Reply
  64. It is very informative. one more thing ” USE VIRTUAL KEYBOARD AS FAR AS POSSIBLE IN NETBANKING”

    Reply
  65. Avatar Mali Ram JoshiFebruary 20, 2014 at 7:33 PM

    I follow some of them.

    Reply
  66. Keep on parting. Thanks, I follow some, will try to follow all.

    Reply
  67. Yes I follow some of them & will try to follow the rest.

    Reply
  68. I follow some of them & will try to follow all of them. Thank You for nice info

    Reply
  69. start following them now

    Reply
  70. Avatar nallapati prudhviFebruary 20, 2014 at 11:26 PM

    nice

    Reply
  71. thanks for the information

    Reply
  72. i follow all the dos and don’t.
    by the way thank u for this info.

    Reply
  73. Avatar samir bhaskar(infinity solution)February 21, 2014 at 1:40 PM

    it’s so good suggestion for my all client and me to.

    Reply
  74. Avatar Parvesh kumarFebruary 21, 2014 at 4:07 PM

    I follow all these.thanks

    Reply
  75. Avatar girish v parekhFebruary 21, 2014 at 10:41 PM

    i follow only some of them. Hence forth will follow all of them. Thank you for the invaluable suggestions

    Reply
  76. Avatar Chaitanya KuralkarFebruary 21, 2014 at 11:20 PM

    I thank Quick Heal for this information provided. I follow some of this do. but from now I will follow all the necessary steps.

    Reply
  77. I will follow all of them thank You..

    Reply
  78. Thanks

    Reply
  79. I will follow these instruction, Thank you.

    Reply
  80. Thanks Rajib,

    That was quite informative ,shall certainly act.

    Regards,

    Raj

    Reply
  81. Its very helpful for all internet novice, thanks.

    Reply
  82. Avatar Avinash BodasFebruary 22, 2014 at 3:14 PM

    I have not been following all of them but I do follow some. Thanks . Will now follow remaining as far as possible.Your advice is not to shop online. How about online payments using ATM / credit cards /internet banking ? Please advice as these are very convenient and hard to avoid.

    Reply
    • Rajiv Singha Rajiv SinghaFebruary 24, 2014 at 3:33 PM

      Hi Avinash,

      Yes, we have advised users to avoid shopping online over unsecured and free WiFi networks. Such activities are safe if the WiFi being used is secured.

      Regards,

      Reply
  83. thanks for this…..!!!
    and i will follow this now

    Reply
  84. Avatar ANIL MUKHIJAFebruary 22, 2014 at 8:38 PM

    I follow some of above.

    Thanks

    Reply
  85. Avatar Dr Chandra Bhushan SinghFebruary 22, 2014 at 9:47 PM

    I want to remove completely uninstall Skype. I tried several times but failed. Is your software can help. Please remove it. It is not at all suitable for India.

    Reply
  86. Do not follow all. But Yes, will be careful in the future.

    Thanks

    Reply
  87. Avatar Purshottam PeswaniFebruary 23, 2014 at 5:58 AM

    I cannot remove the RECYCLER virus with quick heal – QH says the file is free of infection .

    Pl suggest

    Reply
  88. I use some of the tips mentioned, need to do a few more

    Reply
  89. I will follow this do’s & don’ts from now onwards
    thanx a ton !!!

    Reply
  90. Avatar Heerack GangulyFebruary 23, 2014 at 2:20 PM

    Some points, not all were known. Many thanks for the suggestions. Shall be more careful in future. specially thanks for the procedure of blocking pop up windows, they are really irritating, and I didn’t know how to block them permanently.

    Reply
  91. Avatar Aniket BiswasFebruary 23, 2014 at 4:55 PM

    how to enable secure browse???
    right from activation i m trying it but not getting my solution… pleaseee help

    Reply
  92. Avatar Krishna TiwariFebruary 23, 2014 at 7:30 PM

    Thanks for imparting knowledge about cyber safety. Yes I do follow some of the Do’s & don’ts listed.

    Reply
  93. Avatar Krishna TiwariFebruary 23, 2014 at 7:32 PM

    Thanks its important to follow the suggested precautions for a hassle free networkings.

    Reply
  94. Avatar Mietul MehtaFebruary 24, 2014 at 3:07 PM

    i will start following them, thanks to quick heal, credit goes to you

    Reply
  95. Avatar Himansu Kumar PatraFebruary 24, 2014 at 8:35 PM

    How to enable Secure Browsing for my Facebook account?

    Reply
    • Rajiv Singha Rajiv SinghaFebruary 25, 2014 at 4:11 PM

      Hi Himansu,

      1. Go to Settings of your Facebook account
      2. Click Security and then Secure Browsing
      3. Check the box shown and then Save Changes

      Regards,

      Reply
  96. Avatar Himansu Kumar PatraFebruary 24, 2014 at 9:45 PM

    I don’t find “setting” in my Facebook account while I open Facebook. Why does it happen?

    Reply
  97. I follow some of them and I will start following all of them now…Thanks a Lot.

    Reply
  98. Security is a challenge in our day to day life, i will follow these advise as far as possible. Thanking you.

    Reply
  99. I follow some of them but Now I will follow all of them.

    thanks to Quick Heal

    Reply
  100. Avatar ratan sharmaFebruary 25, 2014 at 3:46 PM

    I FOLLOW SOME OF THEM AND GOOD FOR ME.

    THANK YOU

    Reply
  101. Avatar ACCFIN SOLUTIONSFebruary 26, 2014 at 9:22 AM

    will follow this do’s & don’ts from now onwards

    Reply
  102. Avatar sudhakar pandeyFebruary 26, 2014 at 2:46 PM

    yes i follow

    Reply
  103. follow some of them and I will start following all of them now…Thank you !!

    Reply
  104. I follow all of them. I have a problem that my computer does not recognize Quickheal as an antivirus and keeps showing messages that I don’t have any antivirus. Please do help if possible.

    Reply
  105. Avatar Nancy ReaganMarch 6, 2014 at 2:52 PM

    Thank you for your great article. I really like it.

    Reply
  106. I follow all the points mentioned above

    Reply
  107. Avatar Ankur PrakashMarch 16, 2014 at 4:44 PM

    Thanks

    Reply
  108. I follow your article.
    Nice jobs- Tahnks

    I think required security suit content.
    1. antivirus
    2. Anit-Malware
    3. Fire wall.

    Please also write article about virtual Browser.

    Reply
  109. Avatar Kaustubh KulkarniDecember 30, 2014 at 10:49 AM

    I follow some of them and will start following all of them.
    But I do’t understand what are ‘files with multiple extensions’. What are they?

    Reply
    • Rajiv Singha Rajiv SinghaDecember 30, 2014 at 2:36 PM

      Hi Kaustubh,

      Thank you for your comment.

      Files with multiple extensions may be Trojan Horses or other malware waiting for you to open them and release their nefarious content. Be careful with these files.

      Examples of these files are readme.txt.exe

      Regards,

      Reply
      • Avatar Kaustubh KulkarniDecember 31, 2014 at 12:00 PM

        So, is it OK to open such files after check them with anti-virus and no virus is detected?

        Reply
        • Rahul Thadani Rahul ThadaniJanuary 1, 2015 at 9:52 AM

          Hi Kaustubh,

          Yes it is ok. Once you have checked the files there is no more that can be done before opening them. But it is advisable to ensure that the files are genuine in the first place.

          Regards.

          Reply
  110. Avatar nikhil prasadDecember 30, 2014 at 7:23 PM

    Really Helpfull

    Reply
  111. Thanx.ll try following these guidelines now onwards.

    Reply
  112. What about apps which ask for a few permissions but they might have access to other things as well? How do we know it?

    Reply
    • Rahul Thadani Rahul ThadaniJanuary 1, 2015 at 9:53 AM

      Hi Shaan,

      Google has made it mandatory for all apps to only ask for those permissions that they need. No app will take more information than what it specifies in its permissions list at the time of installation.

      Regards.

      Reply
  113. Avatar ghanshyam.C. ParmarDecember 31, 2014 at 1:38 PM

    Really verry verry helpful

    Reply
  114. I will start following them now

    Reply
  115. thanks for your good, best suggestions abt 50 dos and donts

    Reply
  116. Avatar Sudhakar MandrekarDecember 31, 2014 at 1:57 PM

    Useful Checklist and information. Thanks a lot.

    Reply
  117. thank you for the valuable info.

    Reply
  118. Avatar KANHA MAHAKUDDecember 31, 2014 at 2:28 PM

    yup i follow all of the dos and don’ts…. hurrayyyyyyyyyyy

    Reply
  119. Avatar mahesh kumar sihagDecember 31, 2014 at 2:46 PM

    Thanks sir

    Reply
  120. Thanks for info.

    One Query:- Is the Wi Fi connections like reliance, docomo etc. secured or insecured?

    Reply
    • Rahul Thadani Rahul ThadaniJanuary 1, 2015 at 9:54 AM

      Hi Arun,

      A secured Wi-Fi connection is made secured if it is password protected by WEP or WPA2 standards. A service provider has nothing to do with maintenance of this. Does your Wi-Fi have a password to access it? If yes, then it is secured.

      Regards.

      Reply
  121. I follow most of them, wanted to ask one thing. How wud i know or how could i make my data encrypted in mobile phone?
    Pls do reply.

    Reply
    • Rahul Thadani Rahul ThadaniJanuary 2, 2015 at 9:42 AM

      Hi Hasan,

      Which mobile device do you have? You can simply run a Google search about how to encrypt data on your specific model. All modern phones have the ability to encrypt the data within it.

      Regards.

      Reply
      • Thank you Rahul. I use Gionee smartphone, hope it encrypts data by default.
        One more thing to ask that, installing an unverified app/launcher asking full permissions, does that unknowingly fetch/steal data secured in a wallet app also?

        Reply
        • Rahul Thadani Rahul ThadaniJanuary 7, 2015 at 9:53 AM

          Hi Hasan,

          If you can look in the Settings section of your phone, I’m sure you will find an option for encryption there. Moreover, new versions of Android definitely provide encryption capabilities by default.

          If the unverified app/launcher that you have installed is asking for a lot of seemingly unrelated permissions, it is best to not install them. Usually Android’s architecture is designed so that one app cannot look at or steal data from other installed apps. However, this can be made possible if the developer of the rogue app is highly skilled and proficient. Usually, the rogue app itself would request permission to access sensitive data. So it is important to read reviews of the app, understand its functionality and read its permissions carefully before installing.

          Hope that helps.

          Best regards,

          Reply
  122. Thanks sir

    Reply
  123. Avatar S.Srinivasulu, Sericulture DepartmentDecember 31, 2014 at 3:34 PM

    I am sure to follow the maximum number of internet securities advised by Quick Heal Management.

    Reply
  124. it is good to follow all net users.

    Reply
  125. thanks

    Reply
  126. I follow some of them, but from now on I will follow all of them …..Thank you for your good advise.

    Reply
  127. Avatar Omprakash mauryaDecember 31, 2014 at 4:21 PM

    Thanks its important to follow the suggested precautions for a hassle free networkings.

    Reply
  128. Thanks

    Reply
  129. Really helpful

    Reply
  130. Very much valuable suggestions/tips. Thanks to one and all.

    Reply
  131. I follow all of them ever…….

    Reply
  132. Avatar RAVICHANDRANDecember 31, 2014 at 5:31 PM

    Thank you.Lot to be followed

    Reply
  133. Thank youfor the invaluable information. I will start following good essentials of Internet safety. I feel thankful for healthy awareness.

    Reply
  134. Avatar Himansu Kumar KunduDecember 31, 2014 at 6:14 PM

    Thanks a lot. I follow some of them. Will follow rest of them.

    Reply
  135. Thank you dear frnd for the information…

    Reply
  136. Avatar Prof C B SinghDecember 31, 2014 at 6:39 PM

    I posted but it was lost due to wrong CAPTCHA Code. Now I shall not rewrite my those comments. Please refine your software further.

    Reply
    • Rahul Thadani Rahul ThadaniJanuary 1, 2015 at 10:17 AM

      Hi Prof. C B Singh,

      We apologize for the inconvenience. Your feedback has been passed to the concerned team and we shall improve the CAPTCHA code service as soon as possible.

      Best regards.

      Reply
  137. Quickheal is master of antivirus,very good application

    Reply
  138. Avatar Debajit GoswamiDecember 31, 2014 at 6:53 PM

    All should be followed !

    Reply
  139. Avatar ashok beheraDecember 31, 2014 at 7:39 PM

    Many thanks for your guidance.a warm happy new year from me.Shall

    Reply
  140. Avatar Carolyn MalpassDecember 31, 2014 at 7:44 PM

    I follow some of them, but will start following all of them
    I keep being bothered by my green lock on https turning gold. I have been in settings and it does not help. It say Certificate information. This certificate is intended for the following purpose of
    * Ensures the identity of a remote computer
    * Proves your identity to a remote computer
    then they say my page is encrypted and there are several things quarantined. This all comes from DIGICERT HIGH ASSURANCE CA3

    I had team viewer at one time, it has been uninstalled. I had HP Remote, which has been uninstalled. I know nothing about any remote computers and all they want me to do is try something for 5 days.

    Reply
    • Rahul Thadani Rahul ThadaniJanuary 2, 2015 at 9:41 AM

      Hi Carolyn,

      We suggest that you run a full-system scan on your PC to start with. After that, go through your web browsers and see what add-ons and plugins are installed and working. You will probably find some unwanted programs there so you should go ahead and uninstall them. If the problem still persists beyond that, then you should contact our technical support center.

      Regards.

      Reply
  141. Avatar AKSHAY ANANDDecember 31, 2014 at 8:46 PM

    thanks,i obay all your advice

    Reply
  142. Thanks

    Reply
  143. Avatar doctorvnrajuDecember 31, 2014 at 9:05 PM

    I will follow them as suggested

    Reply
  144. Avatar doctorvnrajuDecember 31, 2014 at 9:07 PM

    Very comprehensive list of guidelines

    Reply
  145. Avatar abhishek dattaDecember 31, 2014 at 9:11 PM

    I do follow some of them

    Reply
  146. Avatar Satyanarayan SamalDecember 31, 2014 at 11:16 PM

    Thanks for your guidelines to follow.

    Reply
  147. thank for this valuable advice i follow this . thank you

    Reply
  148. I follow some of them right now. I’ll use this helpful information to follow the rest of them and also get my family and friends to follow them.

    Reply
  149. i download total security but it will not running

    Reply
  150. Avatar Dr. Hriday basumataJanuary 1, 2015 at 7:50 AM

    Wonderful suggestions…..I followed some of them….

    Reply
  151. Following most of the instruction. Thanks

    Reply
  152. Avatar harish chandra guptaJanuary 1, 2015 at 9:16 AM

    So, is it OK to open such files after check them with anti-virus and no virus is detected?

    Reply
    • Rahul Thadani Rahul ThadaniJanuary 2, 2015 at 9:34 AM

      Hi Harish,

      Yes it is ok. Once you have checked the files there is no more that can be done before opening them. But it is advisable to ensure that the files are genuine in the first place.

      Regards.

      Reply
  153. Thank you so much for listing the dos and donts of internet security. I follow some of them. 🙂

    Reply
  154. Avatar bhombe ChandrakantJanuary 1, 2015 at 10:17 AM

    Happy New Year
    Thanks for Service

    Reply
  155. Avatar madan choudharyJanuary 1, 2015 at 10:34 AM

    thanks for publis this.

    Reply
  156. Avatar monu choudharyJanuary 1, 2015 at 11:11 AM

    Happy new year
    Thanks for services

    Reply
  157. Avatar PRINCIPAL, S.U.Patel HIGHSCHOOL,SAIJPURJanuary 1, 2015 at 11:31 AM

    I follow most of them

    Reply
  158. Thank you so much for making a comprehensive and exhaustive list, Though I follow mostly all of them, however I find that most emphasis is placed on use of public network.

    Reply
  159. Avatar Ankit PatelJanuary 1, 2015 at 1:02 PM

    i follow some of them… bt nwonwards i will follow all… thank u so much for ur most valuable guidence towards our security… HAPPY NEW YEAR…

    Reply
  160. Avatar kamlesh RawatJanuary 1, 2015 at 1:17 PM

    thanks

    Reply
  161. I follow some of them but will start to follow all

    Reply
  162. I follow some of them and I will start following all of them now…Thanks a lot !!

    Reply
  163. May i update my quick heal online without activation. I can not purchase original one because of cost.

    Kindly advice

    Reply
    • Rahul Thadani Rahul ThadaniJanuary 2, 2015 at 9:32 AM

      Hi Mannu,

      Unfortunately, you cannot update your Quick Heal virus database if the license is expired or not activated. You can download the trial if you do not wish to purchase the product outright.

      Regards.

      Reply
  164. Avatar Er.Avinash Kakade VNMKV ParbhaniJanuary 1, 2015 at 3:16 PM

    I Follows most of them………..

    Reply
  165. Avatar Er.Avinash Kakade VNMKV ParbhaniJanuary 1, 2015 at 3:17 PM

    Wish You Happy New Year 2015

    Reply
  166. Avatar Kr. B. N. SinhaJanuary 1, 2015 at 3:42 PM

    I follow (a)

    Reply
  167. Avatar dr smita tewariJanuary 1, 2015 at 4:08 PM

    b- I follow some of the do’s and dont’s and and will follow all in future. thanx, smita

    Reply
  168. Avatar Mayuresh PatankarJanuary 1, 2015 at 4:41 PM

    Thanks a lot Friend for giving so many Do’s Doesn’t about internate…..
    most usefull information

    Thanks again frnd

    Reply
  169. Avatar MOHAMMED HUSSAINJanuary 1, 2015 at 4:41 PM

    HI…..

    A HAPPY NEW YEAR TO ALL THOSE WHO READ THIS DOS AND DON’S INTERNET SECURITY OPTIONS. VERY NICE. GOOD JOB. I WILL FALLOW YOUR TIPS. THIS TYPE OF AWARENESS IS IMPORTANT NOW A DAYS. THANK YOU

    Reply
  170. follow all of these dos and don’t

    Reply
  171. Avatar Bhavin JoshiJanuary 1, 2015 at 6:23 PM

    Thanks & I will Use it.

    Reply
  172. We follow most of them.

    Reply
  173. I follow all of them.

    Reply
  174. Thanks, I follow this Dos or Don’ts rule….

    Reply
  175. I do follow a few of them. Shall try to comply with all of them soon. Thanks. Await more such useful information in time to come.

    Reply
  176. Avatar Chandresh BhattJanuary 1, 2015 at 10:54 PM

    it’s a very very usefull i will do

    Reply
  177. Avatar Sachin ShendeJanuary 2, 2015 at 9:50 AM

    HaPpY NeW YeAr It is soooo easy to handle

    Reply
  178. Avatar BAJARANG LAL DUGAWA SUKHWASIJanuary 2, 2015 at 11:01 AM

    Really Helpfull

    Reply
  179. Would is a great

    Reply
  180. now i will start to follow this . and i have one problem that while i m using the quick heal total security even my quick heal is up to date but still it didn’t identify or detect the worms while i scan any pen-drive or hard disk volume .so suggest the solution for it .

    Reply
    • Rahul Thadani Rahul ThadaniJanuary 5, 2015 at 11:59 AM

      Hi Swapnil,

      We regret the inconvenience caused but can you please share some details about these worms. These details would include the name, possible screenshots or any other notable information that you can share.

      Thanks and regards.

      Reply
  181. Great app it protects virus faster

    Reply
  182. Avatar madhusudanaJanuary 2, 2015 at 12:36 PM

    THANKS.am fallowing some but now i will fallow all. once again thanks & HAPPY NEW YEAR TO ALL.

    Reply
  183. Avatar manojj soniJanuary 2, 2015 at 1:56 PM

    it is very very usefull.
    thank you

    Reply
  184. Avatar suchitra senJanuary 2, 2015 at 9:04 PM

    thanks a lot for such an elaborate guidelines. I am trying to follow some of them. but will definitely follow the remaining also

    Reply
  185. Avatar Tabish Akram.January 2, 2015 at 10:27 PM

    Thanks a lot for this valuable information. D.

    Reply
  186. Avatar chandan sharmaJanuary 3, 2015 at 4:06 AM

    thanks,i will fallow its.

    Reply
  187. Avatar Hansraj SharmaJanuary 3, 2015 at 9:56 AM

    Must follow tips ,thanks for such a post.

    Reply
  188. Nice information….I’m following most of them, will follow the remaining….thank you for the information

    Reply
  189. Avatar Dilipsinh.n.patelJanuary 3, 2015 at 11:03 AM

    it is very usefull

    Reply
  190. Avatar K.K.DongayatJanuary 3, 2015 at 2:59 PM

    Even though most of us are aware of the security guide lines still the compilation is very useful. Thank you.

    Reply
  191. Avatar K.K.DongayatJanuary 3, 2015 at 3:02 PM

    Wish all a bright and prosperous NEW YEAR. Happy NEW YEAR 2015.

    Reply
  192. Avatar A.GomathinayagamJanuary 3, 2015 at 6:11 PM

    Really a usefull guidelines..

    Reply
  193. Thanks, really these are very-2 usefull guideline for every one who use the INTERNET every time on PC, Mob, Tab …

    Reply
  194. Avatar Banibrata ChaudhuryJanuary 3, 2015 at 9:48 PM

    Thanks a lot sir. I was ignoring about it.but now is following and requesting you to always guide us for our security, thank you.

    Reply
  195. Avatar R.B.KulkarniJanuary 3, 2015 at 10:35 PM

    Yes i will follow the rules

    Reply
  196. Avatar Dipanjan GhoshJanuary 4, 2015 at 9:46 AM

    B.It’s vry usefull tips for me.Thank You Quick Heal team.

    Reply
  197. I follow some points of them and remaining will resolve from right now…. Thanks for information…Having a secure new year 2015 with quick heal

    Reply
  198. Avatar Manish SharmaJanuary 4, 2015 at 3:18 PM

    Thank you so much for this useful things, I will 100% follow it. Thank a lot.

    Reply
  199. Avatar yogesh gujarJanuary 4, 2015 at 5:18 PM

    thank u for making us aware

    Reply
  200. jthank u.. for informing me..

    Reply
  201. Avatar sanjit Kumar senapatiJanuary 4, 2015 at 8:32 PM

    I like it

    Reply
  202. Avatar ghanshyam.C. ParmarJanuary 4, 2015 at 9:24 PM

    I am verry happy to this security

    Reply
  203. Avatar Pankaj KumarJanuary 4, 2015 at 9:40 PM

    I am very happy to this security used

    Reply
  204. plese give mi product key

    Reply
  205. Thnq very much for did useful information……

    Reply
  206. I follow some of them and I will start following all of them now

    Reply
  207. requesting you to always guide us for our security, thank you.

    Reply
  208. very nice post..

    Reply
  209. Avatar ksrunnambiarJanuary 9, 2015 at 10:53 AM

    Very useful point.You will be a very happy surfer if you follow them all.w387

    Reply
  210. Avatar Md shariful haqueJanuary 10, 2015 at 7:42 AM

    Very nice

    Reply
  211. I liked the do’s don’t do & will try to follow all of them.

    Reply
  212. A good and useful information for better security.
    Be Secure..with Quick Heal..!!! 🙂

    Reply
  213. Avatar easwaran iyerJanuary 15, 2015 at 8:29 PM

    I will follow nowE

    Reply
  214. Avatar easwaran iyerJanuary 15, 2015 at 8:31 PM

    ThaThanks, will follow from now.

    Reply
  215. excellent guidence, Thank you on behalf of rest of the world.

    Reply
  216. Avatar Ravi NakadeFebruary 4, 2015 at 5:14 PM

    Thanks! Surely, I will start following all these.

    Reply
  217. very good

    Reply
  218. I am happy with this security . Hope it will be same with me.

    Reply
  219. Avatar tanya chauhanJune 23, 2015 at 12:43 PM

    I follow some of these but from today itself i will follow all of these

    Reply
  220. Avatar Amanpreet HarbarajansinghdeepOctober 8, 2015 at 8:38 AM

    This is very good. You are very kind!

    Reply
  221. i followed all these before

    Reply