Tsunami Of Computer Attacks

Forest Security Computer Safety News:

by KCS Computer Technology (11/29/16):


We are seeing a tsunami of computer attacks. We think we have encountered a new way to distribute malicious software. One infection we treated may have come from the purchase of a floor model computer. It would not be difficult for someone to insert an USB drive and download a malicious program to a floor model. Also be aware of any suspicious popup windows. They are very likely to be trouble if you respond to them. If you get one, consult your IT people right away.

Computer Do’s and Don’ts

Don’t visit Web sites that you are not sure are safe. Especially be leery of Web sites that are contained in e-mails even if they are forwarded from a trusted source.

Don’t download anything unless you know it is from a safe site. Games, toolbars, screen savers etc. are prime candidates for having embedded viruses, adware and spyware. Be careful of additional programs bundled with legitimate downloads. Only download the program your want. The same holds true for programs supplied on optical, flash or floppy disks or drives.

NEVER give out sensitive personal or business information, such as account or social security numbers to a web site.

Don’t open e-mails or attachments from sources you do not know or trust. Just delete them. Do not unzip zipped files unless you are 100% sure they are safe.

Don’t respond to pop-up windows that say your anti-virus is out of date or your computer needs updating etc. Just click on the “X” and close them down. Always upgrade your programs using the upgrade feature supplied by the program. This is usually accessed through the program menu or help function.

Don’t use floor model or used computers without having them checked first for malicious software..

Do have an up-to-date suite of anti-virus, anti-spyware, anti-phishing and anti-adware programs. Make sure the definitions are kept current – the program should prompt you when they are old.

Do have a backup system and back your data up often. For network systems and critical stand-alone computers at least two recent backup copies should be kept off-site.

Do change your passwords often and make sure they are difficult to break.

http://www.microsoft.com/smallbusiness/support/articles/select_sec_passwords.mspx is a good source for information on secure passwords. And don’t write them on a post-it and stick them on your monitor.

Do have your system or computer scanned and cleaned if you are experiencing numerous pop-up ads, quirky functioning or slow performance. Not only are you losing productivity but your computer usage may be monitored maliciously. Key trackers can record every keystroke made on an infected computer.

This entry was posted in Security News. Bookmark the permalink.