• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Security

Nine Easy Steps To Protect Your Computer From Viruses, Trojans and Infections

February 24, 2007

Here are some helpful suggestions from the experts at TechExperts on how to protect your computer and network.

Step 1: Protect your personal information.
Be suspicious of any email with urgent requests for personal financial information, and never respond to unsolicited requests for confidential information.

Beware of phishing. Phishing is an Internet scam where a message is sent out via email asking you to provide or verify certain information.

Typically these requests are designed to look like they came from a bank or other service provider. Usually there is a link to the bank’s website. But in fact the link doesn’t go to the bank; it goes to a computer controlled by fraudsters. Once armed with your data, thieves take out cash advances from your accounts or may try to steal your identity.

Step 2: Use an anti-virus program and take steps minimize computer virus risks.
Make certain that good, commercial-quality anti-virus software has been installed on your computer. New viruses appear constantly and daily virus definition updating decreases the risk of computers becoming infected. Many free anti-virus programs don’t provide for automatic updating.

Your anti-virus software should be set to automatically update, and should always be running.

Step 3: Install anti-spyware software and enable Windows Firewall.
Spyware is software that is usually downloaded from the Internet, either intentionally under the guise of a service or utility, or without your knowledge as a result of browsing malicious Web sites. Spyware gathers information about how you use your computer, and poses a threat to your privacy.

A firewall is a piece of software or hardware that helps guard computers against hackers as well as many computer viruses and worms.

Windows XP has a built-in firewall product, but it may not be enabled. Give us a call for more information on how to enable Windows Firewall.

Step 4: Be careful with email attachments.
Attachments are files, such as a document or picture that can be sent along with an email. Viruses spread by hijacking an infected computer’s email address book. The virus sends copies of itself as email attachments to everyone in the victim’s email address book. This gives the appearance that your friend is emailing you a joke or a document, but it’s really the virus attempting to spread itself.

If you receive an unexpected email attachment, even if you know the sender, do not open the attachment.

Step 5: Use strong passwords, and change them often.
A strong password is one that is not obvious or easy to guess, it should be 8 – 12 characters long and include a combination of upper and lowercase letters, numbers, and symbols such as punctuation marks and special characters.

Step 6: Stay updated.
As flaws are discovered, software makers such as Microsoft release software updates. To ensure that your computer is secure, install the appropriate updates. There are a few circumstances where you might not want to, but generally, always enable Windows Update to automatically install updates to your system.

Step 7: Be careful about downloading.
Tons of no-cost programs are available with more becoming available each day. If a program is written with malicious intent, the author/intruder will not tell you that it will harm your system.

Many no-cost programs collect data about you and then sell that data to advertisers. These types of programs are called “spyware” (see step 3 above).

Step 8: Backup, backup, backup!
In case of emergencies, such as a hard drive crash, documents and data files stored only on your local hard drive need to be backed up and backups need to be periodically tested. If you are not sure if your files are being backed up, give us a call – we’ll be happy to help.

You may also want to consider encrypting and/or password-protecting files so that data will be unusable if stolen. Note that conventional passwords, such as Windows passwords, do not secure your data.

Step 9: Know where to go when you need help with your computer.
Keep our 24 hour computer emergency hotline telephone number available: (734) 240-0200. We’re always here to help with your computer problems!

Data Security And Theft Top IT Concerns For 2006, Continuing Into 2007

December 29, 2006

The number of personal records exposed in data security breaches surpassed 100 million this year.

So says the Privacy Rights Clearinghouse, which has been keeping count ever since a high-profile data leak at information broker ChoicePoint in early 2005. It keeps track of thefts and losses of gear such as laptops, storage tapes and drives, as well as of hacking incidents and insiders who leak data.

The count climbed throughout 2006: Boeing, the Department of Veterans Affairs, Hewlett-Packard, McAfee, the University of California, and many others made headlines as a result of breaches.

Most incidents come to light because of laws requiring public notification of data loss in cases where data is unencrypted. In response, security companies are increasingly pitching encryption products for secure storage–for example, Seagate Technology is building it into its drives. Microsoft is also getting into the game: business versions of Windows Vista have a full-disk encryption feature called BitLocker.

But encryption technology still lacks usability, a panel of industry experts said at an event celebrating the 30-year anniversary of cryptography.

Meanwhile, banks and credit agencies are hawking credit-monitoring services. In September, researchers named several banks as a consumer’s best bet in terms of offering protection against identity theft.

Breaches are only one way people’s identities can be compromised. Phishing scams are getting more widespread, and fraudsters are getting trickier in their attempts to con Internet users. People with high incomes attract more phishing e-mails and lose more money to them than other Internet users, according to a November Gartner report.

Scammers are helped by an apparent influx of cross-site-scripting bugs. These Web security flaws could let attackers craft a URL that looks like it points to a trusted site, but serves up content from a third, potentially malicious site. This year, this type of bug was found in many popular Web sites and in Google’s search appliances.

Phishing shields are now common. Microsoft has built one into its latest browser, IE 7, and Mozilla offers a similar feature in Firefox 2.

Alternative approaches to combat phishing include a new DNS service, OpenDNS, whose free address-lookup service blocks phishing sites and other threats.

Yahoo added an antiphishing feature to its site that displays a custom image on the log-in screen to verify that it is indeed a Yahoo page.

But if confidential data isn’t exposed through data breaches or pilfered through a phishing scam, there’s still malicious software. Criminals are crafting more-targeted Trojan horse attacks that seek to sneak onto PCs through zero-day flaws, experts have warned. In addition, some malicious software is now designed to let cybercrooks surf into online banks with you to steal your money.

You could also be exposed while on the go. Privacy watchers warn that people carrying passports equipped with radio chips could have the information in the document read from a distance. The solution: keep the passport closed and in a foil bag.
— from CNET News Service

« Previous Page

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.