With more people using digital devices every day as a workplace it is important to keep computers protected from viruses; a computer virus is a program that invades computer host systems and most of these viruses use e-mail systems to transmit.
Please keep in mind some behavior modification, this is just as important as education on cybersecurity according to an article written by David L Wilson in 1999:
#1. A user should not send executable programs or documents with macros unless necessary. If it is necessary to send such attachments, the sender needs to communicate to the recipient to expect specific attachment.
#2. A user should not open an attachment that is an executable program or a document with a macro (.xlsm .dotm) unless there is specific knowledge that the attachment is safe to open.
#3. A user should inform their information services staff if they receive an e-mail attachment that appears to contain a computer virus. This last behavior provides early warning of new computer viruses.
How to avoid viruses to protect your computer?
- Proactively check the domains of the email sender (@gmail.com @hotmail.com @aol.com or even fake ones as in the screenshot)
- Download file only from trusted sites: You should download only files that are from known, well-established, companies. When in doubt, don’t download the file.
- Use anti-malware software: There are several good software packages available, for both PC and Mac, that can help to protect your system.
- Be aware of Fake Ads: these are ads that will trick you into doing something totally unrelated to what you originally intended to do.
Best practices to keep a virus free computer (Managed through Teltek’s IT Support)
- Install and use antivirus software: a good antivirus software will detect and prevent any new infections.
- Use a firewall to protect your computer from hackers gaining unauthorized access to your computer.
- Strong passwords: It is best practices to combine letters, number, special characters to keep you accounts safe.
- Update your security software: constantly! As Cyber criminals are always finding new ways to infiltrate systems