Protect Your Business
Security To Protect Your Business From Malware
If you own a computer and you allow your computer to be used to surf the Internet you may be at risk of being infected with Malware.
So what is Malware?
It is a collective term that includes many different types of hostile, intrusive, or annoying software programs. These includes Trojans, worms, and Viruses.
Viruses have the ability to replicate themselves and cause the infected computer to become a zombie computer. A zombie computer is a computer that continues to appear as a vulnerable computer but contains malicious programs. Most of the time, a virus will cause the computer to become completely useless.
A Trojan is similar to a virus. It is a computer program that appears to be safe. However, once it is run, it can damage the computer or give the owner of the computer access to its files.
A worm is also similar to a virus. It is a self-replicating computer program. It uses network transport systems to infect other computers. Most of time, worms will cause some type of damage to the network, or network computers in general.
An especially common form of infection is called a “drive-by download”. This is when a web application that has been downloaded, i.e. a web page, an executable program or a script, is run on a computer via an infected web browser. The web application downloads the malicious program and runs it, often with the purpose of spreading further infections to other computers that the infected web browser is targeting.
Knowing how your computer works and what the potential vulnerabilities are in your network (and soon your computer itself) is the first step towards staying secure on the Internet.
Top 10 Computer Security Tips
1. Install an anti-virus software program and set it up to automatically check for updates on a regular basis.
2. Use a firewall to control the incoming and outgoing traffic on your network.
3. Protect your computer by installing an anti-spyware and personal firewall program.
4. Keep all of your software updated and apply all patches and service packs when they become available.
5. If you use floppy disks or other removable media to run programs on them, you should always scan them for viruses before using them.
6. Never open an email attachment if you do not know who the sender is or you do not know the sender’s domain.
7. Avoid downloading files from sources you are not familiar with.
8. Be careful of links – either the clickable type or the pointing type. If unsure, hover your mouse over the link and read the URL. An URL that starts with “http” is a good way to start a new search. If in doubt, contact the sources of the link and ask them if it is a trusted site.
9. Remove viruses, spyware and adware files from your computer with the anti-virus software that came with your computer. Restart your computer to do this. There are software upgrades that can help increase your protection.
10.Handling cookies – There are theories on why some cookies are harmful to your computer. Cookies are thought to be in there to track your surfing habits. Cookies can also be malicious in that they track your thousands of account numbers and passwords so that they can be used by others. You can see why you would want to delete all cookies, some of which may be benign. In any case, they should be deleted. Protect Your Business Protect Your Business Protect Your Business Protect Your Business Protect Your Business