Skip to content

What are the Sources of Computer Viruses?

When you think of computer safety, the first thing that comes to mind is avoiding and preventing a computer virus. Everyone knows that a computer virus can destroy your laptop to the point where it’s completely non-functional. If it hasn’t happened to you before, it’s happened to someone you know.

The thing is, we never really talk about how we get a virus in the first place. You probably have a firewall on your computer, but you should still know where it comes from.

In general, attacks come through four mediums. Even though you typically use them every day, there are still steps you can take to protect your computer.

Internet Viruses

An obvious way to get a computer infection is through the Internet. It would be best to always exercise caution before downloading any file or document. Always check the source and be particularly careful of .exe files. At any rate, use anti-virus software to scan all files before downloading.


Besides randomly downloading files on the Internet, email is the next most common source of threats. Be careful of downloading email attachments that are forwarded to several addresses. If you receive an out-of-character message from a friend or family member, send the email right to your spam folder.

Removable Storage

A virus from removable storage may not occur as frequently as the sources mentioned above, but it’s still possible. Don’t let just anybody plug a flash drive into your computer. And when they do, have the files checked by anti-virus software.


Even less common than removable storage, a virus can also come from Bluetooth transfers. You can unknowingly have a virus transferred to your computer through a Bluetooth transfer. Again, the answer is to use anti-virus software to check all files gained through file transfer.

Want advanced protection from viruses and malware?

WheelHouse IT provides pro-active monitoring and scanning solutions for business networks. We are your first line of defense to protect your computers and devices from threats. Speak with a specialist by booking time on our calendar below.

a woman in a business suit is using a laptop

Reliable Network Monitoring Support

Reliable Network Monitoring Support Ensure network security and operational efficiency with robust network monitoring. A strong monitoring system is indispensable

a man holding a computer case with many wires

How to Protect Your Electronics Against Disaster

Know how to protect your business technology and electronics against natural disasters. It’s important for companies to develop a game plan that will ensure employees are able to communicate with others before, during, as well as after a natural disaster to keep the business running.

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.