Steps you should take to prevent viruses and spywares from getting into your computer.
Step 1: Block Pop-Up Windows in Your Browser.
To help protect your computer from malicious pop-up windows in your browser, use a utility that prevents them from opening. Read on...
Step 2: Read E-Mail Messages in Plain Text.
This will prevent malformed script from executing on your computer. Read on...
Step 3: Periodically Perform a Complete Virus Scan on your Computer.
Check that your anti-virus has been updated. And run this scan when you are away from your computer, say during Monday lunch hours. Read on...
There are some additional precautionary steps you can take:
- NEVER download and/or run an attached file on an e-mail from a stranger or from an unknown address. Be VERY cautious when downloading and running even one from a friend (most likely if they pass you a virus, they won’t know they did it!).
- NEVER run an executable file you’ve just received without first running it through an updated anti-virus utility.
- If your computer is on a network, make sure you have security steps in place to prevent unauthorized users putting files on your computer. Networks are ideal virus transmitters since they are accessed by many computers and there usually is a great deal of interaction between these computers. You will be better off removing Shared drive from your computer all together.
- TAKE CARE in using floppy disks! The more computers a floppy has been used on, the better the chance of a virus infecting it. ALWAYS run floppies through an anti-virus program before using it and be extremely cautious when booting your computer from a floppy disk (it’s adviseable not to do so).
- KEEP YOUR E-MAIL AND ANTI-VIRUS SOFTWARE UPDATED! Software companies are always finding problems with their software and if they are good about it, will post patches to update your software.
Notes for system administrators:
- Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
- Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
- Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
- Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
- Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
- Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
Updated On: 13.06.12