Computer Security...
Cyber Crime is becoming a major world wide problem.
You need to protect your personal information from a wide range of attacks,
from viruses and telephone scams. It is vital, therefore, that you
have an efficient anti-virus package with a good firewall installed on your
PC.
However, it doesn't matter how good your anti-virus software is,
if you give someone permission to access your PC remotely, whether by
clicking on a link contained in an email or by allowing remote access, they
will be able to bypass whatever security you install!
Always follow these simple rules...
-
Train every user in your home or office to be aware of PC Security.
Good discipline is the best defence against viruses and
hackers.
-
Back-up your important
files regularly, particularly if you have business critical data.
DO NOT LEAVE BACKUP DRIVES PERMENANTLY PLUGGED INTO YOUR PC. NEVER
TRY TO BACKUP TO A CURRENT BACKUP DRIVE IF YOU SUSPECT YOU HAVE BEEN
INFECTED. IT IS GOOD PRACTICE TO CYCLE A COUPLE OF BACKUP DRIVES
SO THAT YOU HAVE MORE THAN ONE COPY.
-
Never allow anyone to remotely access your PC unless you explicitly
trust them. DO NOT ALLOW ANYONE WHO TELEPHONES YOU OUT OF THE BLUE
TO REMOTELY CONTROL YOUR PC NO MATTER HOW GENUINE THEY SOUND.
-
Always install a good quality Anti-virus package. We recommend
Bullguard, but Norton and Bitdefender are also very good. The free
packages, such as AVG and Avast offer good, but basic, protection -
remember when it comes to PC security you get what you pay for.
-
Install Malwarebytes free
anti-malware software as well as an Antivirus package. Malwarebytes offer both free and a paid for
packages. Their paid for package does offer excellent all-round
protection. However, the free version of Malwarebytes is an excellent backstop, finding malware
and viruses that the main packages often miss.
-
Never open attachments
unless you are expecting them. Remember some viruses will appear to come
from people who you know and trust. Get your correspondents to email a
confirmation email first. Be suspicious of emails from UPS, FEDEX
or other companies giving details of parcel deliveries, purchase orders
or invoices you are not expecting - a common way of distributing
Ransomware.
-
A lot of people share
jokes, cartoons and funny animation and send them to each other in
emails. Most are fine but some will be infected. It is safer to
ask people not to include you in their distribution list.
-
Look at the wording of emails carefully. Many
(if not most) virus infected emails come from people whose first
language is not English - look out for poor grammar, wrongly used or mis-spelt
words etc.
-
When deciding on an
email address avoid using your name, e.g. avoid
john.smith@btopenworld.com. Spammers often randomly
put first and second names together with common ISP addresses. Use a
nickname or alias, e.g. nailseabob@btopenworld.com. This will reduce the
incidence of spam if nothing else.
-
Choose a 'strong' password. Passwords should be 8 characters or
longer and comprise of a mixture of uppercase and lowercase letters,
numbers and symbols. Avoid peoples or pets' names, parts of your
address, birthdates etc. because they are too easy to guess. Never
use the same password on every site you visit. It is probably
impossible to have a different password for every site you visit. At the
very least, use different passwords on shopping sites or on-line banking
sites.
-
Only give out your
email address to people you trust - make sure they also run Anti-Virus
software.
-
If you run a network, avoid 'mapping' a network
drive. Some viruses are 'network aware' and
will treat a mapped network drive as a local drive and so infect it.
Obviously, in some situations you cannot avoid using 'mapped drives'. It is
particularly important, in that circumstance, that you maintain strict
discipline , as far as PC security is concerned, and backup using a
three device cycle.
-
Be careful what you
download from the web - pirated music, games and software from file sharing sites is
frequently infected.
-
Microsoft issues updates to Windows weekly. These updates
include security improvements which are vital to keeping your PC secure.
Never turn off Windows Updates.
For the latest information and
advice, or to report an attack on your PC visit
http://www.actionfraud.police.uk/
Actionfraud UK is a website setup by Police in the UK to
help combat on-line fraud.
Virgin Media's security exprts have created created
a cyber security safety test to help build awareness around cybercrime,
identity theft, malware & phishing to ensure users are better protected
online. To view
click here
Telephone Scams...
It is becoming more common for fraudsters to
telephone unsuspecting people claiming to have identified a problem with
their PC and offering to fix it. If you allow them access to your PC they download a small program that
enables them to remotely control it. Whilst doing so, they have
pretty much unlimited access and are able to copy files to their own
computers without you knowing they are doing so. They can also install
viruses or software that locks your PC until you pay them an 'unlocking'
fee. Frequently, they install software that searches your PC for
credit card or back account details.
The reality is that it is virtually impossible for anyone to tell that your PC
is faulty. IF ANYONE TELEPHONES YOU OUT OF
THE BLUE CLAIMING THEY HAVE DETECTED A PROBLEM WITH YOUR PC SIMPLY PUT THE
TELEPHONE DOWN.
If your PC is infected by a virus and which, in
turn, attaches viruses to emails you send out you may get a phone call from
an irrate receipient. In those circumstances say sorry and promise to
run a virus scan. Do not let someone to access your PC to do a scan
for you. They are likely to be 'scammers'.
What is Malware...
Malware is general term which covers all the
types of programs which can attack your PC, including viruses, ransomware,
keystroke loggers and PUPS.
Viruses can be keystroke loggers,
which monitor keys you type to try and identify credit card details or
website log on credentials. They may open 'a back door' to your PC so
that someone can 'hack in' and remotely control it. Some are cookies
that track the websites you visit and feed that back to a marketing company
who then tries to target you with advertising based on the sites you visit. Some can be file downloaders which download unwanted programs,
which then install on your PC.
Many of the files that anti-malware software finds
are not in themselves dangerous, just irritating. They are often known
as PUPS (Potentially unwanted programs). A PC that is heavily infected
with PUPS can be VERY slow, experience loads of pop-up windows, redirect you
to dangerous websites and, in extreme cases can stop the PC openning genuine
software.
Many of the best known anti virus packages, which
are good at protecting against viruses, are poor at protecting you against
these. We recommend Malwarebytes (see note at bottom of page) as a backup to your exisiting
anti-virus package. Running Malwarebytes weekly will keep your PC
clear of the PUPS and other malware your main anti-virus software may miss.
Ransomeware...
Many fraudsters distribute
viruses via email. They either attach a file to
the email, which infects your PC when you open it, or
insert a link in the email which takes you to an
infected website. These viruses can either encrypt
your hard drive stopping you from accessing your
documents, photos, email or programs without paying a
fee. This is called ransomware and is becoming
very common. Once your hard drive is encrypted
there is nothing that can done to recover your data
(unless you pay the ransom and not always then).
Ransomware is typically
distributed via email. You may receive an email
that looks as if it comes from a genuine company, often
UPS or Fedex. They contain a link, supposedly
taking you to a webpage that gives information about a
shipment they claim they are sending to you. This
link installs the encryption software and then encrypts
your PC. Whenever you try to open a file a window
appears telling you that the file is encrypted and
tells you how to pay to have the files un-locked.
The software is very clever and
searches your hard drive for files to encrypt. If
your PC is a part of a network and has a 'mapped' network
drive, i.e. a connection to a folder on the server, for
example, it will encrypt the files on the server as
well. This can be disastrous for a company if
there is no backup. Thousands of companies and
organisations, including hospitals and other medical
centres, have been affetced.
You should bear in mind that
if you leave a backup drive permanently plugged into
your PC this will be encrypted as well.
Clearly, the best way to avoid being hit by a ransomware
attack is not to follow links or open attachments you
are not expecting. However, the fraudsters are
becoming increasingly sophisticated and it can be
difficult to recognise that you are being attacked.
It is vital, therefore, that you backup important files
to an external drive (or memory stick) on a regular
basis. The best way is to cycle three backup
devices, one in the machine, one somewhere secure and one off
site. Then cycle them everyday.
Rootkit Viruses..
The most common forms of rootkit either damage the
PC’s they infect or redirect the systems' resources for purposes ranging
from pranks to gratifying their authors' egos to crime. Some are simply
utility applications. An example of the latter is a rootkit that provides
CD-ROM emulation capability allowing video game users to defeat anti-piracy
features that require the original installation media. Rootkits can test
resistance to assorted potential attacks. However, malicious rootkits siphon
and transmit private/sensitive data, for example: PINs, account passwords,
credit card particulars, etc. Some rootkits can operate successfully upon
multiple operating systems.
Trojan Horse Viruses...
A Trojan horse is similar to a virus in that it
can harm your computer, however it is potentially more dangerous. This is
because it sits on your machine and waits quietly to be triggered by a
malicious user on the Internet who has installed it on your computer before
it wreaks havoc.
The 'trigger' is usually a particular date in the
future, but it can be something as simple as waiting for you to install a
certain piece of software on your computer. Some can even be activated
remotely by their authors (the malicious users), as and when they want to
gain access to and control of your computer.
|
|
Trojan horse programs can be used to take complete
control of your PC by an unauthorised third party. They are often used to
steal information such as Internet banking details for malicious (and
commonly, fraudulent) purposes.
In some extreme cases, identity theft can take
place as a result of sensitive and confidential information being stolen
from a computer by a user using a Trojan horse installed on that machine.
This is when someone uses personal information about another person in order
to pretend to be that person. As one can imagine, the consequences of this
can be very serious indeed.
What to do if you get
virus warnings from others...
Virus hoaxes are very common. If you get an email
from someone warning of an imminent virus attack treat it with a pinch of
salt. It's almost certainly a hoax. And, whatever you do, don't pass the
warning on without checking first!
By passing a warning on, you may feel you're being
a good Samaritan. But if it's a hoax, you are actually adding to it and
helping to spread the hoax to other users. This in turn causes unnecessary
panic amongst people, which is exactly what the originator of the hoax wants
to happen.
You should independently verify for yourself that
it isn't a hoax by visiting Symantec's Anti Virus Research Center and
searching their hoax database.
If it is there, then simply ignore the hoax and do
not action it. However, if it isn't there, then, and only then, pass the
warning on. Remember, Chinese whispers can cause damage!
|
What to do if your
computer is infected by a virus?
First and foremost, you should run your virus
checking program on your machine to detect and remove the virus. As new
viruses emerge all the time, make sure you have updated your anti-virus
software with the latest virus definitions. If you can, download and
run the free version of Malwarebytes.
If you are unable to remove the
infection then please contact us on
07442 491921
If you do not have any anti-virus software
installed on your computer, we strongly advises that you install a package
immediately.
NOTE! You will note that we recommend that you install Malwarebytes on
your PC. It is important to say that we don't get paid or
receive any financial gain from recommending this product. We
recommend it because it is VERY good.....
|