Prevent Phishing and Malware
Use the tools here to improve your defenses against phishing attacks and malware. Start by selecting your operating system.
The tools included in this toolbox aim to help prevent these types of attacks. Included are: DNS security (DNS, or Domain Name Service, is the method by which you are able to navigate the internet) to help prevent you from going to infected websites; anti-virus software to help prevent viruses and other malicious software from getting into your systems; and ad blockers, together with correct filter lists, help prevent malicious activity and access to malicious websites while browsing the Internet. We recommend considering use of one of each of these tools on the devices you identified in the “Know What You Have” step.
Use this tool to block access to malicious domains.
Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.
Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...
Use/customize this template to build your company's phishing policy.
Watch this video to learn how to protect yourself from malware.
Watch this video to learn how to ensure safer use of the Internet.
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.