Background Image
Table of Contents Table of Contents
Previous Page  10 / 46 Next Page
Information
Show Menu
Previous Page 10 / 46 Next Page
Page Background

1

Viruses.

Like a virus that can

infect a person, a computer virus

is a contagious piece of code that

infects software and then spreads from

file to file on a system. When infected

software or files are shared between

computers, the virus then spreads to the

new computer. The best way to protect

from viruses is with a reliable antivirus

program that is kept updated.

2

Spyware

.

Just like a spy, a

hacker uses spyware t o track

your internet activities and steal

your information without you being

aware of it. What kind of information

is likely to be stolen by Spyware?

Credit card numbers and passwords

are two common targets. Spyware is

also known to cause PC slowdowns. A

common mistake many people make

is they assume their antivirus software

automatically protects them from

Spyware. This is not always true as

some antivirus software isn’t designed

to catch spyware. If you’re unsure,

check with your antivirus vendor or IT

Service Provider.

3

Worms.

Similar to viruses,

worms also replicate themselves

and spread when they infect a

computer. The difference, however,

between a worm and a virus is that

a worm doesn’t require the help of a

human or host program to spread.

Instead, they self-replicate and spread

across networks without the guidance

of a hacker, file or program to latch onto.

Again, you need a reliable antivirus

software program to prevent worms

from infecting your system.

You should also ensure your firewall is

activated and working properly.

4

Trojans.

Like the Trojan horse

from ancient Greek mythology,

this type of malware is disguised

as a safe programdesigned to fool users

so they unknowingly install it on their

own systems. Generally, a hacker will

use a Trojan to steal both financial and

personal information. It can do this by

creating a “backdoor” to your computer

that allows the hacker to remotely

control it. Similar to the other threats

I have mentioned, antivirus software is

a dependable way to protect against

Trojans. For further safety, it’s wise to

not open up suspicious attachments

and also ensure that your staffmembers

aren’t downloading any unapproved

programs or applications or going to

internet sites that are not approved.

These are favorite places for hackers to

hide Trojans.

Scary, right? As mentioned before,

having a proper Firewall set up and a

reputable anti-virus program are the

best ways to protect from the security

threats I’ve mentioned. If you’re not

sure if you have these, consult your IT

Service Provider.

CLICK HERE TO WATCH MY VIDEO EPISODES

SOAR TO SUCCESS

| AUGUST 2015 |

Core Business Strategies