DEFENDING YOUR COMPUTER FROM MALWARE: IDEAL PRACTICES FOR KMS PICO END USERS