1
Viruses.
Like a virus that can
infect a person, a computer virus
is a contagious piece of code that
infects software and then spreads from
file to file on a system. When infected
software or files are shared between
computers, the virus then spreads to the
new computer. The best way to protect
from viruses is with a reliable antivirus
program that is kept updated.
2
Spyware
.
Just like a spy, a
hacker uses spyware t o track
your internet activities and steal
your information without you being
aware of it. What kind of information
is likely to be stolen by Spyware?
Credit card numbers and passwords
are two common targets. Spyware is
also known to cause PC slowdowns. A
common mistake many people make
is they assume their antivirus software
automatically protects them from
Spyware. This is not always true as
some antivirus software isn’t designed
to catch spyware. If you’re unsure,
check with your antivirus vendor or IT
Service Provider.
3
Worms.
Similar to viruses,
worms also replicate themselves
and spread when they infect a
computer. The difference, however,
between a worm and a virus is that
a worm doesn’t require the help of a
human or host program to spread.
Instead, they self-replicate and spread
across networks without the guidance
of a hacker, file or program to latch onto.
Again, you need a reliable antivirus
software program to prevent worms
from infecting your system.
You should also ensure your firewall is
activated and working properly.
4
Trojans.
Like the Trojan horse
from ancient Greek mythology,
this type of malware is disguised
as a safe programdesigned to fool users
so they unknowingly install it on their
own systems. Generally, a hacker will
use a Trojan to steal both financial and
personal information. It can do this by
creating a “backdoor” to your computer
that allows the hacker to remotely
control it. Similar to the other threats
I have mentioned, antivirus software is
a dependable way to protect against
Trojans. For further safety, it’s wise to
not open up suspicious attachments
and also ensure that your staffmembers
aren’t downloading any unapproved
programs or applications or going to
internet sites that are not approved.
These are favorite places for hackers to
hide Trojans.
Scary, right? As mentioned before,
having a proper Firewall set up and a
reputable anti-virus program are the
best ways to protect from the security
threats I’ve mentioned. If you’re not
sure if you have these, consult your IT
Service Provider.
CLICK HERE TO WATCH MY VIDEO EPISODESSOAR TO SUCCESS
| AUGUST 2015 |
Core Business Strategies