Get All Access for $5/mo

8 Ways to Protect Yourself From Microsoft's Dangerous Internet Explorer Bug Take these quick, easy steps to fend off hackers taking advantage of a serious flaw in the popular web browser.

By Kim Lachance Shandrow

Opinions expressed by Entrepreneur contributors are their own.

Internet users can't get a breather from security threats, even as we're still reeling from Heartbleed.

And now, if you're using Internet Explorer, you have even more to stress out about.

Your computer could be completely taken over -- as in remote controlled -- by hackers. Not good, and you're especially at risk if you're still running XP.

Related: Cyber Security a Growing Issue for Small Business

News of Microsoft's dangerous web browser bug made the rounds over the weekend and the tech giant is still racing to fix it. The vulnerability, uncovered by the Milpitas, Calif.-based cyber security firm FireEye, is a particularly nasty one. It leaves users wide open to cyber thieves who could exploit the flaw to pollute computers with malware and, yes, even remotely control users' computers, according to a sobering security advisory Microsoft released over the weekend.

You could take your chances, sit back and wait for Microsoft and its security team to "take the appropriate action" to protect you, which "may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs." Translation: Help is on the way, but not soon enough.

Related: Your Password is 123456? Wow. Seriously?

Or you could take matters into your own hands (hopefully before hackers get their hands on your matters) and protect yourself by taking the following simple protective steps and fast:

1. Don't use Internet Explorer at all.
Even the U.S. Department of Homeland Security says you should stop using it until Microsoft until untangles this big mess. Seriously. Instead, surf the web using a different browser, like Google Chrome or Mozilla Firefox, especially if you're running Windows XP, which you really shouldn't be anymore. You don't want to be the next victim of "Operation Clandestine Fox," do you?

2. Disable Adobe Flash.
FireEye said disabling the Adobe Flash plugin within Internet Explorer "will prevent the exploit from functioning." Basically, doing so will stop hackers in their tracks. Yeah, you'd better get on that right away.

3. Get behind a firewall.
Firewalls help safeguard your computer from hackers who could steal your identity, banking information, credit card numbers and more. Most computer operating systems already have a firewall built in. Double check that yours does and that it's turned on.

Related: 4 Ways to Protect Yourself From the 'Heartbleed' Bug

If you're running a Windows operating system, check if it automatically comes with firewall protection here. You can also add additional firewall protection to your computer and network for free from ZoneAlarm or Sygate Personal Firewall Free.

4. Install antivirus and antispyware software.
Installing antivirus and antispyware software and regularly keeping it updated is critical, even when you're not reacting to the latest threats. Antivirus software detects and removes malware, including adware and spyware, and filters out potentially dangerous downloads and emails.

Brian Underdahl, author of Cybersecurity for Dummies (Wiley, 2011), suggests CheckPoint Software Technologies' ZoneAlarm Extreme Security, a comprehensive antivirus software security package. It costs $54.95 for one year and $84.95 for two years. Some other popular, equally effective antivirus tools include Bitdefender Small Business Security ($150 for one year) and Webroot SecureAnywhere Antivirus 2013 ($39.99 for one year).

5. Apply all software updates.
If you insist on still using Internet Explorer, install all of the latest software patches from Microsoft. It's a vital preventative step to add to your security hygiene routine. You can get all of the latest Microsoft software updates here.

6. Use Internet Explorer in "Enhanced Protected Mode."
This enhanced security feature, which was first rolled out with Windows 8, helps stave off cyber criminals looking to mess with your system settings, install harmful software and steal your personal data.

Enhanced Protected Mode is turned off by default in Internet Explorer and on the Windows 8.1 desktop. When it's enabled, it only loads add-ons, including browser toolbars and extensions, only if they're compatible with Enhanced Protected Mode.

Related: Why You Should Skip the Password and Try These Things Instead

To turn it on, go to your Internet Explorer "Internet options," then select "advanced." Next, navigate to the security section. Choose "Enable Enhanced Protection Mode." Select "OK" and restart Internet Explorer.

7. Download this toolkit.
Microsoft advised in a blog post over the weekend that Internet Explorer users should install its Enhanced Mitigation Experience Toolkit (EMET) 4.1 to "help protect against this potential risk." Even Microsoft admits that the toolkit isn't completely hacker-proof, though. What is anyway these days?

8. Don't click on suspicious links.
By now, this should be old hat. Avoid sketchy looking URLs like the plague. Also, don't open emails from anyone you don't know or even suspicious seeming emails from someone you do know. If you accidentally open an email that contains suspect attachments or links, don't click on any of them.

Related: Our Collective Mobile Security Blind Spot

Kim Lachance Shandrow

Senior Writer. Frequently covers cryptocurrency, future tech, social media, startups, gadgets and apps.

Kim Lachance Shandrow is a senior writer at Entrepreneur.com. 

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Growing a Business

You'll Never Satisfy Your Customers — or Grow Your Business — Without Doing These 3 Things

Customer feedback can be used to drive sustainable growth. Here are three approaches to how you can move past measurement to drive improvement and ultimately grow your business.

Business News

Southwest Airlines Is Switching Up Its Boarding Policy and Assigning Seats for the First Time Ever

The airline, known for its unique open seating model, will assign seats for the first time in company history.

Leadership

From Crisis to Control — How to Lead Effectively in High-Stress Scenarios

From the eye of the storm to the heart of leadership: How BELFOR's Sheldon Yellen's approach to the disaster recovery industry is revolutionizing resilience in business.

Growing a Business

5 Lessons Nonprofit Leaders Can Learn from Big Tech

Nonprofits can do more good by adopting a few key lessons from tech companies — like focusing on efficiency and using data for strategic decision-making.

Starting a Business

How to Find the Right Programmers: A Brief Guideline for Startup Founders

For startup founders under a plethora of challenges like timing, investors and changing market demand, it is extremely hard to hire programmers who can deliver.

Fundraising

Working Remote? These Are the Biggest Dos and Don'ts of Video Conferencing

As more and more businesses go remote, these are ways to be more effective and efficient on conference calls.