1: Install Quality Antivirus: Download The PDF Version
1: Install Quality Antivirus: Download The PDF Version
1: Install Quality Antivirus: Download The PDF Version
With that in mind, here's a handy reference list of 10 steps end users can
adopt to avoid infection (including when using home systems to read and
send work e-mail, create, edit, and distribute documents and spreadsheets,
access the corporate VPN, and perform other office tasks). Post this list on
your Intranet, distribute it in an e-mail, or download the PDF version and pass
it along to end users. Just be sure the word gets out. Otherwise, you're likely
to find yourself losing precious time cleaning and repairing infected systems or
entire networks.
Unfortunately, that's just not the case. Most free anti-spyware programs do not
provide real-time, or active, protection from adware, Trojan, and other
spyware infections. While many free programs can detect spyware threats
once they've infected a system, typically professional (or fully paid and
licensed) anti-spyware programs are required to prevent infections and fully
remove those infections already present.
3: Keep anti-malware applications current
Antivirus and anti-spyware programs require regular signature and database
updates. Without these critical updates, anti-malware programs are unable to
protect PCs from the latest threats.
In early 2009, antivirus provider AVG released statistics revealing that a lot of
serious computer threats are secretive and fast-moving. Many of these
infections are short-lived, but they're estimated to infect as many as 100,000
to 300,000 new Web sites a day.
5: Disable autorun
Many viruses work by attaching themselves to a drive and automatically
installing themselves on any other media connected to the system. As a
result, connecting any network drives, external hard disks, or even thumb
drives to a system can result in the automatic propagation of such threats.
Users should never click on email attachments without at least first scanning
them for viruses using a business-class anti-malware application. As for
clicking on links, users should access Web sites by opening a browser and
manually navigating to the sites in question.
8: Surf smart
Many business-class anti-malware applications include browser plug-ins that
help protect against drive-by infections, phishing attacks (in which pages
purport to serve one function when in fact they try to steal personal, financial,
or other sensitive information), and similar exploits. Still others provide "link
protection," in which Web links are checked against databases of known-bad
pages.
But even manual entry isn't foolproof. Hence the justification for step 10:
Deploy DNS protection. More on that in a moment.
Another worry is Web sites that distribute infected programs, applications, and
Trojan files. Still another threat exists in the form of poisoned DNS attacks,
whereby a compromised DNS server directs you to an unauthorized Web
server. These compromised DNS servers are typically your ISP's systems,
which usually translate friendly URLs such as yahoo.com to numeric IP
addresses like 69.147.114.224.
Users can protect themselves from all these threats by changing the way their
computers process DNS services. While a computer professional may be
required to implement the switch, OpenDNS offers free DNS services to
protect users against common phishing, spyware, and other Web-based
hazards.