{"id":101222,"date":"2020-05-18T17:32:40","date_gmt":"2020-05-19T00:32:40","guid":{"rendered":"\/blogs\/?p=101222"},"modified":"2025-08-29T01:27:01","modified_gmt":"2025-08-29T08:27:01","slug":"stay-protected-from-malware-while-online-at-home","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/","title":{"rendered":"How to Stay Protected From Malware While Online at Home"},"content":{"rendered":"<p><span data-contrast=\"auto\">Our everyday lives are not what they used to be three months ago. Many users have made the transition from working in an office to\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/top-five-things-to-do-to-stay-secure-when-working-from-home\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">working from home<\/span><\/a><span data-contrast=\"auto\">\u00a0and<\/span><span data-contrast=\"auto\">\u00a0students have ad<\/span><span data-contrast=\"auto\">opted\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-notices\/stay-secure-while-distance-learning\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">distance learning<\/span><\/a><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">But while the world focuses on one virus sweeping the globe, criminals see an oppo<\/span><span data-contrast=\"auto\">rtunity to spread other types of viruses across our networks and devices.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As users adapt to their increased time spent at home<\/span><span data-contrast=\"auto\">\u00a0and online<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">hackers are\u00a0<\/span><span data-contrast=\"auto\">taking advantage\u00a0<\/span><span data-contrast=\"auto\">by<\/span><span data-contrast=\"auto\">\u00a0spread<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0malware and other scams<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Let\u2019s break down some of the major\u00a0<\/span><span data-contrast=\"auto\">malware\u00a0<\/span><span data-contrast=\"auto\">scams affecting users today,\u00a0<\/span><span data-contrast=\"auto\">as well as how they can stay secure.\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Remote\u00a0Workers\u00a0Targeted\u00a0Through RDP\u00a0Ports<\/h2>\n<p><span data-contrast=\"auto\">With<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"none\">recent<\/span><span data-contrast=\"none\">\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/covid-19-malware-makes-hay-during-a-pandemic\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">events<\/span><\/a><span data-contrast=\"auto\">\u00a0accelerat<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">the\u00a0<\/span><span data-contrast=\"auto\">WFH trend,\u00a0<\/span><span data-contrast=\"auto\">many\u00a0<\/span><span data-contrast=\"auto\">companies<\/span><span data-contrast=\"auto\">\u00a0have<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">restricted\u00a0<\/span><span data-contrast=\"auto\">employee travel and\u00a0<\/span><span data-contrast=\"auto\">allocated\u00a0<\/span><span data-contrast=\"auto\">more resources to enable virtual work.\u00a0<\/span><span data-contrast=\"auto\">According to McAfee security researcher\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercriminals-actively-exploiting-rdp-to-target-remote-organizations\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Thomas\u00a0<\/span><span data-contrast=\"none\">Roccia<\/span><\/a><span data-contrast=\"auto\">, a key component of enabling <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/remote-workers-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote work<\/a> and allowing employees to access internal corporate resources remotely is\u00a0<\/span><a href=\"https:\/\/www.techopedia.com\/definition\/3422\/remote-desktop-protocol-rdp\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Remote Desktop Protocol<\/span><\/a><span data-contrast=\"auto\">\u00a0(RDP)<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">RDP<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">is a Microsoft protocol that\u00a0<\/span><span data-contrast=\"auto\">allows communication with a remote system.\u00a0<\/span><span data-contrast=\"auto\">At a time where connectivity is more impor<\/span><span data-contrast=\"auto\">tant now than ever before,\u00a0<\/span><span data-contrast=\"auto\">it\u2019s critical for users\u00a0<\/span><span data-contrast=\"auto\">to be able to easily access the<\/span><span data-contrast=\"auto\">\u00a0same tools and apps that they would in their office<\/span><span data-contrast=\"auto\">\u00a0from their newfound remote work environments<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">However<\/span><span data-contrast=\"auto\">, it<\/span><span data-contrast=\"auto\">\u2019s<\/span><span data-contrast=\"auto\">\u00a0likely that many organizations brought systems online quickly with minimal security checks in place, giving attackers the opportunity to\u00a0<\/span><span data-contrast=\"auto\">infiltrate<\/span><span data-contrast=\"auto\">\u00a0them with ease.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Because<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">RDP ports are often exposed to the\u00a0<\/span><span data-contrast=\"auto\">internet,\u00a0<\/span><span data-contrast=\"auto\">\u00a0an<\/span><span data-contrast=\"auto\">\u00a0attacker\u00a0<\/span><span data-contrast=\"auto\">could gain\u00a0<\/span><span data-contrast=\"auto\">access to an entire network<\/span><span data-contrast=\"auto\">\u00a0and consequentially, access a remote employee\u2019s system<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">What\u2019s more,<\/span><span data-contrast=\"auto\">\u00a0these networks can be used as entry point<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0for spreading malware or other malicious activities.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Since March 2020,\u00a0<\/span><span data-contrast=\"auto\">the\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercriminals-actively-exploiting-rdp-to-target-remote-organizations\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">McAfee Advanced Threat Research\u00a0<\/span><span data-contrast=\"none\">team<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">has seen a significant increase in the\u00a0<\/span><span data-contrast=\"auto\">number of exposed RDP ports. But what does that mean for users working remote<\/span><span data-contrast=\"auto\">ly<\/span><span data-contrast=\"auto\">?\u00a0<\/span><span data-contrast=\"auto\">Because exposed RDP ports grant criminals access to remote system<\/span><span data-contrast=\"auto\">s, they are able to\u00a0<\/span><span data-contrast=\"auto\">implement a number of malicious threats that could not only\u00a0<\/span><span data-contrast=\"auto\">impact<\/span><span data-contrast=\"auto\">\u00a0users working from home but\u00a0<\/span><span data-contrast=\"auto\">also\u00a0<\/span><span data-contrast=\"auto\">the organizations they work for. These threats include spreading spam<\/span><span data-contrast=\"auto\">\u00a0and<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">malware,\u00a0<\/span><span data-contrast=\"auto\">as well as\u00a0<\/span><span data-contrast=\"auto\">us<\/span><span data-contrast=\"auto\">ing<\/span><span data-contrast=\"auto\">\u00a0the compromised\u00a0<\/span><span data-contrast=\"auto\">RDP\u00a0<\/span><span data-contrast=\"auto\">port<\/span><span data-contrast=\"auto\">\u00a0to\u00a0<\/span><span data-contrast=\"auto\">disguise malicious activity and\u00a0<\/span><span data-contrast=\"auto\">compile their tools on the machine.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Phishing\u00a0Emails Spreading\u00a0Malware\u00a0and\u00a0Ransomware<\/h2>\n<p><span data-contrast=\"auto\">Recently, hackers have also leveraged\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/learn\/phishing-email-examples-how-to-recognize-a-phishing-email\/\"><span data-contrast=\"none\">phishing emails<\/span><\/a><span data-contrast=\"auto\">\u00a0regarding\u00a0<\/span><span data-contrast=\"auto\">today\u2019s\u00a0<\/span><span data-contrast=\"auto\">current events to lure\u00a0<\/span><span data-contrast=\"auto\">people<\/span><span data-contrast=\"auto\">\u00a0into engaging with\u00a0<\/span><span data-contrast=\"auto\">malicious content\u00a0<\/span><span data-contrast=\"auto\">and\u00a0<\/span><span data-contrast=\"auto\">enabling threats<\/span><span data-contrast=\"auto\">\u00a0to gain access to their systems<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">Once established, that foothold can allow\u00a0<\/span><span data-contrast=\"auto\">hackers<\/span><span data-contrast=\"auto\">\u00a0to\u00a0<\/span><span data-contrast=\"auto\">leverage<\/span><span data-contrast=\"auto\">\u00a0malware to\u00a0<\/span><span data-contrast=\"auto\">steal usernames and passwords, data, monitor user activity, capture user keystrokes, track network traffic and browser activity, and infiltrate networks and cloud services beyond the home.<\/span><span data-contrast=\"auto\">\u00a0Criminals<\/span><span data-contrast=\"auto\">\u00a0can<\/span><span data-contrast=\"auto\">\u00a0also<\/span><span data-contrast=\"auto\">\u00a0impersonate their victim to send emails from the infected\u00a0<\/span><span data-contrast=\"auto\">device<\/span><span data-contrast=\"auto\">s to propagate themselves on numerous other systems.\u00a0<\/span><span data-contrast=\"auto\">What\u2019s more, hackers could<\/span><span data-contrast=\"auto\">\u00a0spread ransomware that\u00a0<\/span><span data-contrast=\"auto\">encrypt<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0system files and refuse to decrypt them until the victim sends a ransom payment.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Stay\u00a0Secure in the\u00a0New\u00a0Digital\u00a0Landscape<\/h2>\n<p><span data-contrast=\"auto\">Hackers will always seek to capitalize on current events in order to spread cyber misfortune.\u00a0<\/span><span data-contrast=\"auto\">The recent surge of remote employees and users taking to the internet in order to pass the time is no<\/span><span data-contrast=\"auto\">\u00a0exception.\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">However, there\u00a0<\/span><span data-contrast=\"auto\">are several<\/span><span data-contrast=\"auto\">\u00a0steps users can take to facilitate a safe online environment for themselves and their families. Here\u2019s what you can do to stay protected<\/span><span data-contrast=\"auto\">\u00a0from malware regarding the current health emergency and similar threats<\/span><span data-contrast=\"auto\">:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Secure your RDP protocol<\/h3>\n<p><span data-contrast=\"auto\">Because RDP remains one of the most used vectors to breach into organizations<\/span><span data-contrast=\"auto\">\u00a0and personal networks<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">it<\/span><span data-contrast=\"auto\">\u2019s important<\/span><span data-contrast=\"auto\">\u00a0to follow best security practices<\/span><span data-contrast=\"auto\">. This includes<\/span><span data-contrast=\"auto\">\u00a0using strong passwords and<\/span><span data-contrast=\"auto\">\u00a0multi-factor authentication,<\/span><span data-contrast=\"auto\"> patching vulnerabilities <\/span><span data-contrast=\"auto\">immediately,\u00a0<\/span><span data-contrast=\"auto\">and not allowing RDP connections over the open internet.\u00a0<\/span><span data-contrast=\"auto\">Discover more\u00a0<\/span><span data-contrast=\"auto\">best practices on how to secure your RDP protocol in our blog on\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">RDP security<\/span><\/a><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Beware of messages\u00a0from\u00a0unknown\u00a0users<\/h3>\n<p><span data-contrast=\"auto\">If you receive a text, email, social media message, or phone call from an unknown user regarding the current health emergency, it\u2019s best to proceed with caution and avoid interacting with the message altogether.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Go directly\u00a0to the\u00a0source<\/h3>\n<p><span data-contrast=\"auto\">If you receive information from an unknown user, go directly to the source instead of clicking on links within messages or attachments. Using a tool like\u00a0<\/span><span data-contrast=\"none\">McAfee\u00a0<\/span><span data-contrast=\"none\">WebAdvisor<\/span><span data-contrast=\"auto\">\u00a0can help users stay safe from\u00a0<\/span><span data-contrast=\"auto\">malware and other<\/span><span data-contrast=\"auto\">\u00a0threats while searching the web.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2>Stay Updated<\/h2>\n<p><span data-contrast=\"auto\">To stay updated on all things\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">McAfee<\/span><\/a><span data-contrast=\"auto\">\u00a0and on top of the latest consumer and mobile security threats, follow\u00a0<\/span><a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">@<\/span><span data-contrast=\"none\">McAfee_Home<\/span><\/a><span data-contrast=\"auto\">\u00a0on Twitter, listen to our podcast\u00a0<\/span><a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Hackable?<\/span><\/a><span data-contrast=\"auto\">, and \u2018Like\u2019 us on\u00a0<\/span><a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Facebook<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our everyday lives are not what they used to be three months ago. Many users have made the transition from&#8230;<\/p>\n","protected":false},"author":674,"featured_media":101223,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661],"tags":[4452,32,180,4185],"coauthors":[3973],"class_list":["post-101222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security","tag-cybersecurity","tag-data-protection","tag-malware","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Stay Protected From Malware While Online at Home | McAfee<\/title>\n<meta name=\"description\" content=\"Many users have made the transition to working from home. But while the world focuses on one virus sweeping the globe, criminals see an opportunity to spread other types of viruses across our networks and devices. As users adapt to their increased time spent at home, hackers are taking advantage by spreading malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Stay Protected From Malware While Online at Home | McAfee\" \/>\n<meta property=\"og:description\" content=\"Many users have made the transition to working from home. But while the world focuses on one virus sweeping the globe, criminals see an opportunity to spread other types of viruses across our networks and devices. As users adapt to their increased time spent at home, hackers are taking advantage by spreading malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-19T00:32:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T08:27:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"How to Stay Protected From Malware While Online at Home\",\"datePublished\":\"2020-05-19T00:32:40+00:00\",\"dateModified\":\"2025-08-29T08:27:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg\",\"keywords\":[\"cybersecurity\",\"data protection\",\"malware\",\"Phishing\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/\",\"name\":\"How to Stay Protected From Malware While Online at Home | McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg\",\"datePublished\":\"2020-05-19T00:32:40+00:00\",\"dateModified\":\"2025-08-29T08:27:01+00:00\",\"description\":\"Many users have made the transition to working from home. But while the world focuses on one virus sweeping the globe, criminals see an opportunity to spread other types of viruses across our networks and devices. As users adapt to their increased time spent at home, hackers are taking advantage by spreading malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg\",\"width\":1024,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Stay Protected From Malware While Online at Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Stay Protected From Malware While Online at Home | McAfee","description":"Many users have made the transition to working from home. But while the world focuses on one virus sweeping the globe, criminals see an opportunity to spread other types of viruses across our networks and devices. As users adapt to their increased time spent at home, hackers are taking advantage by spreading malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Stay Protected From Malware While Online at Home | McAfee","og_description":"Many users have made the transition to working from home. But while the world focuses on one virus sweeping the globe, criminals see an opportunity to spread other types of viruses across our networks and devices. As users adapt to their increased time spent at home, hackers are taking advantage by spreading malware.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-05-19T00:32:40+00:00","article_modified_time":"2025-08-29T08:27:01+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"How to Stay Protected From Malware While Online at Home","datePublished":"2020-05-19T00:32:40+00:00","dateModified":"2025-08-29T08:27:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/"},"wordCount":776,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg","keywords":["cybersecurity","data protection","malware","Phishing"],"articleSection":["How To Guides and Tutorials","Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/","name":"How to Stay Protected From Malware While Online at Home | McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg","datePublished":"2020-05-19T00:32:40+00:00","dateModified":"2025-08-29T08:27:01+00:00","description":"Many users have made the transition to working from home. But while the world focuses on one virus sweeping the globe, criminals see an opportunity to spread other types of viruses across our networks and devices. As users adapt to their increased time spent at home, hackers are taking advantage by spreading malware.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/twitter22.jpg","width":1024,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/stay-protected-from-malware-while-online-at-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"How to Stay Protected From Malware While Online at Home"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/101222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=101222"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/101222\/revisions"}],"predecessor-version":[{"id":221531,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/101222\/revisions\/221531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/101223"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=101222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=101222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=101222"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=101222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}