Link to home
Start Free TrialLog in
Avatar of Bazingeroo
BazingerooFlag for Afghanistan

asked on

What Are You Suggestions And Recommendations On How You Would Approach This Concept Where A User Would Routinely Run Another Reputable Brand(s) Of Security Programs To One's Normal Usage?

Hello. I have a question to ask. This is applicable to my Windows 7 64-bit operating system.

I typically use, like most of us for our Windows operating system, an Internet software security suite program for my computer that is it is inclusive to an anti-virus, anti-spyware, firewall, and an arsenal of many additional component laden feature functions to the software program as well. As users, many of us get affixed to a particular brand or company manufacturer's prospective Internet software security suite program or a consistent mix of various computer software security products (specific to anti-virus, anti-spyware and firewall) to protect our computer. I have often wondered staying too long with the same particular security program products may not be a good idea since continual usage of the same prescribed set of security programs over a long period of time may allow for 'unique undetected' malware to inhibit a user's system due to SAME relative measure of a security program's product programming methodology and process by means to scan, detect, and block malware WITHOUT the diversity of a variety of DIFFERENT security program products.

Therefore I find it a very good idea to routinely run ANOTHER reputable BRAND of prescribed set of security programs to one's normal usage.

Question:

What are you suggestions and recommendations on how you would approach this concept where a user would routinely run ANOTHER reputable brand(s) of security programs to one's normal usage? Please explain.

Please reply.

Thank you!
SOLUTION
Avatar of Ess Kay
Ess Kay
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
I agree with tzucker.  A careless user can infect a system no matter how good your protection is.  I use the basic NOD32 and Window's built in firewall and have very few problems with any of my clients.
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Bazingeroo

ASKER

@ esskayb2d, joelsplace, tzucker, younghv, & ve3ofa:

Hello. Nice to meet esskayb2d, joelsplace, tzucker, and younghv! Nice to see ve3ofa again.

Thank you all for your comments.

First, I must say that is question/thread is a subjective with elements of objectivity laced in your responses. I am less concerned with the products for a particular brand or company manufacturer's prospective Internet software security suite program or a consistent mix of various computer software security products in your comments; yet I do appreciate you providing them in your comments. I am more interested in the 'variety' and 'methods' you 'routinely do' -- that is what I am seeking here and there is no right or wrong answer for this question/thread. Therefore, it is like a general survey question of sorts on your methods of system protection(s).

Being objective and observing all expert comments' system security methods, I can say that joelsplace's first comment is the only one who commented that would take reactive when a security issue problem developed.  Everyone else and in a later expert comment by joelsplace , besides esskayb2d, has complete confidence in their prospective particular brand or company manufacturer's prospective Internet software security suite program or a consistent mix of various computer software security products. esskayb2d has complete confidence in the Windows 7 operating system.  

Basically out of 5 different expert comments' system security methods, 3 experts reply on their complete particular brand or company manufacturer's prospective Internet software security suite program or a consistent mix of various computer software security products. As I have said, 1 would be reactive when a security issue problem developed, and 1 has faith in the Windows 7 system. Therefore, my majority, experts have faith in each of their own system security installations and setups and do not periodically modify their own setup system security operations. That is what I learned here. Thank you.

Since it is a subjective based question, everyone wins. I do have to award that one Accepted Solution, therefore, younghv's comment with his own EE weblink linking me to a well written online article addressing 'ALL' measures and most informative to lessen any risk of infection or malware issues will be the Accepted Solution. I see joelsplace commented twice and because I am evaluating PER EXPERT's system security methods, I will omit joelsplace second comment for fairness. Therefore 5 different experts each with a comment will get 100 points equally.

Again, thank you all!