How to Protect Your Home Computer from Hackers
Most home computers are easier to compromise than people think — not because hackers are sophisticated, but because the basics are so consistently ignored. The majority of successful attacks don't involve breaking through advanced defenses. They exploit weak passwords, unpatched software, and a click on the wrong link.
The good news is that fixing those things is straightforward and covers most of the real risk.
Keep your software updated
This is the least exciting advice and the most important one. Software updates exist primarily to patch security vulnerabilities — flaws that attackers actively scan for and exploit. Running outdated software is the equivalent of leaving a known unlocked door on your house.
This applies to your operating system, your browser, your browser extensions, and any other applications you use regularly. Windows Update, macOS Software Update, and most modern software handle this automatically if you let them. The main thing is not to dismiss update prompts indefinitely.
Browser extensions deserve specific attention. They have broad access to your browsing activity and are frequently targeted by attackers. Extensions that get acquired or compromised can turn malicious overnight. Keep the ones you actually use, remove the ones you don't, and make sure they're kept current.
Use strong, unique passwords
Password reuse is the most common way accounts get compromised. A breach at one site — a retailer, a forum, an app you used once — exposes your credentials. If you've used the same password elsewhere, attackers try it there too. It works often enough that it's automated.
A password manager solves this. Bitwarden is free and open source. 1Password and Dashlane are strong paid options. The manager generates and stores a unique password for every account, so a breach at one site doesn't cascade into a breach everywhere else. You only need to remember one master password.
If a password manager feels like too much, at minimum use unique passwords for your email, your bank, and anything tied to a payment method. Those are the accounts where compromise causes real damage.
Turn on two-factor authentication
A password is a single point of failure. Two-factor authentication adds a second layer — typically a code from an app or a text message — so that stealing your password alone isn't enough to get in.
An authenticator app like Authy or Google Authenticator is more secure than SMS codes, which can be intercepted through SIM swapping. But SMS-based 2FA is still significantly better than no 2FA.
Enable it on your email first. Email is the recovery mechanism for almost every other account — whoever controls your email can reset passwords everywhere else. Then your financial accounts, then anything else that matters.
Be deliberate about what you click
Phishing is the most common attack vector for home users. An email that looks like it's from your bank, a shipping notification, a password reset you didn't request, a Google Docs link from someone you know whose account was compromised — the goal is always the same: get you to click something that either installs malware or hands over credentials.
A few habits that help:
Check the sender's actual email address, not just the display name. Display names can say anything. The address is harder to fake convincingly — look for misspellings, odd domains, or addresses that don't match the supposed sender.
Be skeptical of urgency. Phishing relies on creating pressure to act quickly before you think. "Your account will be suspended in 24 hours" is a red flag, not a reason to click faster.
When in doubt, go directly to the site rather than clicking the link. If your bank is really trying to reach you, logging in directly will surface whatever they need you to see.
Use antivirus software
Windows Defender, built into Windows 10 and 11, is genuinely good and covers most home users adequately at no cost. On macOS, the built-in protections are solid, though third-party options like Malwarebytes add a useful additional layer.
The key is keeping it running and updated. Antivirus software that's out of date has gaps in its threat database and misses newer malware.
A separate malware scanner run periodically — Malwarebytes is the standard recommendation — catches things that slip through real-time protection.
Secure your home network
Your router is the gateway for everything on your network. A compromised router means all your traffic can be intercepted or redirected.
Change the default admin credentials. Every router ships with a default username and password — usually something like admin/admin or admin/password. These are publicly known and the first thing attackers try. Change them.
Use WPA3 or WPA2 encryption. Check your router's wireless settings and make sure you're not using the older WEP or WPA standards, which have known weaknesses. WPA2 is acceptable, WPA3 is better if your router supports it.
Keep your router's firmware updated. Router manufacturers release firmware updates to patch vulnerabilities. Most modern routers can check for updates through their admin interface. This gets ignored more than almost anything else on this list.
Use a guest network for IoT devices. Smart TVs, thermostats, cameras, and other connected devices often have weaker security than computers or phones. Putting them on a separate guest network isolates them — if one gets compromised, it can't reach the rest of your network.
Use a VPN on public Wi-Fi
Your home network is under your control. Public Wi-Fi is not.
Coffee shops, airports, hotels, libraries — any public network puts you in close proximity with strangers who have the same access to the network you do. Basic traffic interception on public Wi-Fi requires minimal technical knowledge and freely available tools.
A VPN encrypts your traffic so that even on a compromised or hostile network, what you're doing is unreadable. This matters most when you're doing anything sensitive — checking email, logging into accounts, any financial activity. On a public network without a VPN, those sessions are exposed.
Back up your data
Ransomware encrypts your files and demands payment for the decryption key. Backups make ransomware a recoverable problem rather than a catastrophic one.
The standard recommendation is the 3-2-1 rule: three copies of your data, on two different types of media, with one copy offsite. In practice for most home users this means: your main drive, an external hard drive, and a cloud backup service. Windows has built-in backup tools. macOS has Time Machine. Cloud options include Backblaze, iCloud, and Google Drive.
The backup is only useful if it's current. Automated backups that run without requiring you to remember are more reliable than manual ones.
How Veilock fits in
Veilock covers the network layer of your security — the part that most home security advice doesn't address directly.
On public Wi-Fi, Veilock encrypts your traffic end to end so nobody on the same network can read it. At home, it masks your IP address so websites and services can't build a profile of your browsing tied to your location. DoH encryption prevents your DNS queries from being visible to your ISP. And the no-logs policy means your activity isn't stored anywhere on Veilock's infrastructure.
For most people, combining a VPN with the basics on this list — updated software, strong passwords, 2FA, and some skepticism about what you click — covers the vast majority of real-world risk.
Secure your connection with Veilock
Common questions
Do I need antivirus if I'm careful about what I click?
Yes. Careful behavior reduces risk significantly but doesn't eliminate it. Drive-by downloads, compromised legitimate websites, and malvertising can deliver malware without any obviously suspicious action on your part. Antivirus provides a safety net for cases where careful behavior isn't enough.
Is a Mac safer than a Windows PC?
Macs have historically been targeted less than Windows machines, partly due to market share. That gap has narrowed as Macs have become more common. macOS has solid built-in security, but it's not immune — malware targeting Macs exists and is increasing. The same basic practices apply regardless of platform.
What should I do if I think my computer has been hacked?
Disconnect from the internet to prevent further data exfiltration. Run a full antivirus and malware scan. Change passwords for your important accounts from a different device. Check for unauthorized access in your email and financial accounts. If you suspect a serious compromise, consider a full OS reinstall — it's the only way to be certain malware has been removed.
How do I know if my password has been in a data breach?
Have I Been Pwned (haveibeenpwned.com) lets you enter your email address and shows you which known data breaches it appeared in. It's maintained by security researcher Troy Hunt and is a reliable resource. If your email appears in breaches, change the passwords associated with those accounts immediately.
Is a VPN the same as antivirus?
No — they address different threats. Antivirus detects and removes malware on your device. A VPN protects your network traffic from being intercepted or monitored in transit. Both are useful and they don't overlap — a VPN won't catch malware, and antivirus won't protect your traffic on public Wi-Fi.