Be smart

it's a jungle out there

 

We want our clients to work safely and productively. Our job is to build the systems to protect you but it is also to educate you on how to protect yourself. Please read these basic guidelines to keep you out of harm's way.

1 Email

Don't open email attachments or downloaded files without verifying that they came from a reputable source.


2 Links

Be wary of clicking links in email messages. It is safer to visit the site by typing its URL.


3 Fake Virus Warning

Be alert to fake virus warnings, often within web browser windows, that encourage you to download, install, or purchase unfamiliar software..


4 Pirated Software

Dangerous Malware is often bundled together with pirated software. When you install the pirated software you may also install malware.


5 Social engineering

Malware authors often try and trick you into doing what they want. This can be clicking or opening a file because it looks legitimate, paying money to unlock your PC or visiting a malicious webpage. These deceptive appeals are known as social engineering. Social engineering scams can be both

online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company).


6 Passwords

Attackers may try to guess your Windows account or other passwords. This is why you should always use a password that can't be guessed easily. A strong password has at least eight characters and includes letters, numbers, and symbols.


7 P2P Software

In current use Peer-to-Peer, or P2P, means the sharing of files between users on the Internet. BitTorrent files or "torrents" are a popular method used to share files between computers. Users share files with "peers" allowing them to download files from other users with out relying on a central distribution point. Files acquired from torrents can be dangerous, particularly if they contain executable files like games or pirated software. Programs designed to remove or circumvent copy protection are particularly dangerous, frequently containing viruses or trojan horse programs. Do not use P2P applications on business machines.