Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Do not open any files attached to an email from an unknown, suspicious or untrustworthy source.
  2. Do not open any files attached to an email unless you know what it is, even if it appears to come from a dear friend or someone you know. Some viruses can replicate themselves and spread through email. Better be safe than sorry and confirm that they really meant to send it.
  3. Do not open any files attached to an email if the subject line is questionable or unexpected.
  4. Delete chain emails and junk email. Do not forward or reply to any of them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. Many people with bad intentions send junk email looking for valid email addresses to test their virus-wares on. And if you reply to this junk mail you could become their next target.
  5. Do not download any files from strangers.
  6. Exercise caution when downloading files from the Internet. Ensure that the source is a legitimate and reputable one. Verify that an anti-virus program checks the files on the download site. If you're uncertain, don't download the file at all or download the file to a CD and test it with your own anti-virus software.
  7. Update your anti-virus software regularly. Over 200 viruses are discovered each month, so you'll want to be protected.
  8. Back up your important files on a regular basis. If a virus destroys your files, at least you can replace them with your back-up copy.
  9. When in doubt, always error on the side of caution and do not open, download, or execute any files or email attachments.

 


What is Spyware?

"Spyware comes in various forms, but basically it is a program or piece of information on your computer that sends data about you or your computer habits to someone else on the Internet. Spyware can also be a program that places unwanted ads on your computer. Cookies can be considered spyware. They are little piece of information placed in your web browser to track your web habits. This is useful sometimes as a web site can see you have visited it before and let you on without a registration process. Cookies are also used to keep track of your progress through a web store. They are also used to customize website ads to your likes and dislikes."

...

  • Don't reply to email or pop-up messages that ask for personal or financial information, and don't click on links in the message. Don't cut and paste a link from the message into your Web browser — phishers can make links look like they go one place, but that actually send you to a different site.
  • Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly.
  • Don't email personal or financial information.
  • Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  • Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them.
  • Forward phishing emails to spam@uce.gov – and to the company, bank, or organization impersonated in the phishing email. You also may report phishing email toreportphishing@antiphishing.org. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing.
  • If you've been scammed, visit the Federal Trade Commission's Identity Theft website at ftc.gov/idtheft.

...


...

Live Search
sizelarge
additionalpage excerpt
placeholderSearch Answers
typepage

...