Editor’s note: This article was updated in full in January 2015.
If you have a PC, you’re a target.
You need security software. That’s as true today as it was a decade ago, despite significant security improvements to Windows over the years. But you have a choice—you can either continue paying the security software vendor of your choice an annual fee for protection or you can take matters into your own hands and build your own suite of security tools using free products. Here’s how to keep your PC protected without paying a dime.
The pros and cons of free
Going free can save you some cash, but it isn’t a panacea. When you buy a paid antivirus product, you usually get some form of customer support with it; with free products, you are often on your own when it comes to solving problems. Also, going free means that you have to stitch together a combination of utilities, so it sometimes takes a little trial and error to find the best tools for your needs. Premium suites offer seamless, relatively pain-free security solutions.
Free products also often include browser toolbars or other add-ons that you might not necessarily want. In some cases, freebies will include ads that help their makers pay the bills. In some cases, the ads and add-ons are a small price to pay for saving some dough; in others, though, they can be downright intrusive. As ever, be sure to be mindful while you’re installing free programs to avoid installing bloatware you don’t want, which is often marked for installation by default.
If you can put up with those caveats, going the freebie route might be for you—just think of all the money you’re saving.
Grab some antivirus software
Antivirus software is the key component of any security suite, and for good reason—it’s going to be your primary defense against malware. And when it comes to free antivirus apps, you have some good options.
Avast Free Antivirus and Panda Free Antivirus are two free products that are worth your attention. According to recent benchmarks published by the German antivirus testing firm AV-Test, Panda’s freebie did and excellent job at stopping malware and it didn’t result in a single false-positive. Avast Free Antivirus put up solid all-around numbers, though it wasn’t quite as good as Panda’s showing.
No matter which antivirus app you choose, make sure you pick one that does a good job at catching so-called “zero-day” attacks. Antivirus programs that can stop zero-day attacks are going to be more effective at stopping brand new malware, which is very important given how quickly malware can evolve.
Have a secondary antivirus app
Even the best traditional antivirus software can have a hard time removing stubborn, deeply embedded malware. With that in mind, it’s good to have a secondary antivirus app at your disposal.
Malwarebytes Anti-Malware Free can provide an extra layer of security against Internet baddies. It isn’t really intended for use as your primary antivirus, but you can use it alongside most other antivirus programs, and it’s earned its stellar reputation by offering above-average protection against cutting-edge zero-day attacks. In other words, it can sometimes catch infections that other antivirus software might miss.
Another utility worth downloading is Norton Power Eraser: This free tool targets so-called scareware—those annoying bits of malware that try to get you to buy phony antivirus programs—that traditional antivirus software may miss. Symantec warns that Norton Power Eraser is an aggressive scanner that may occasionally flag a legitimate program as malware, so you’ll want to use it as a last resort, but it’s a good weapon to have in your PC security arsenal.
Use a firewall
Windows comes with a built-in firewall that’s turned on by default. it’s a good basic option, but if you want something with more flexibility, you have some options. Take a look at both Comodo Free Firewall and ZoneAlarm Free Firewall: These two utilities come with additional features and configuration options and offer more protection than the built-in firewall alone.
Windows Firewall should suffice for most people. It sits quietly in the background until it detects a suspicious connection attempt, and it’s as low-maintenance as low-maintenance can be—but it only flags inbound penetration attempts by default. That’s where the more robust Comodo and ZoneAlarm tools come in handy, as they also monitor outbound connection requests, though they require a bit more manual labor as you teach them which processes and applications should be allowed to reach out to the Internet.