Wherever you go and whatever you do,
    .
May the luck of the Irish be there with you. .
Leprechaun Technical Services Canyon Lake, TX

  HOME

  ABOUT

  SECURITY & SAFEGUARDS

  EDUCATION

  REVIEWS

  CONTACT

HOURS
Mon-Fri
7am-5pm

 

Security & Safeguards for your Computer

Types of Security Threats and Countermeasures: from Security State Bank & Trusts handout

Malware

  • Software designed to infiltrate a computer system without the owners informed consent
  • Malware includes computer viruses, worms, Trojan horses, spyware, crimeware and other malicious and unwanted software

Viruses

  • A computer program that can copy itself and infect a computer
  • Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them

Spyware

  • Type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge
  • The presence of spyware is typically hidden from the user and can be difficult to detect
  • It can install additional software, redirect web browsers, change computer settings, set different home pages, and/or result in loss of internet

Rogue Software/Scareware

  • Form of malware that deceives of misleads users into paying for the fake or simulated removal of malware
  • Mainly relies on social engineering in order to defeat the security software
  • Most have a Trojan horse component, which users are misled into installing
  • Browser plug-in (typically toolbar)
  •    Image, screensaver or ZIP file attached to an email
  •    Software shared on peer-to-peer networks
  •    A free online malware scanning service

Ransom Virus

  • Comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed.

Phishing

  • Criminally fraudulent process of attempting to acquire sensitive information (usernames, passwords, credit card details) by masquerading as a trustworthy entity in an electronic communication
  • Commonly used means: social websites, auction sites, online payment processors, IT administrators

Email Usage

  • The fastest most-effective method of spreading malicious code to the largest number of users

IN OTHER WORDS: Be aware of where you go on the internet, what you click on to open, what you are agreeing to when you install something. Never install an exe file unless you trust the source. Never click on a link in an email to update your information. Be on alert!

Use a cache cleaning service, install a real-time anti-virus and anti-spyware program and implement a firewall. Allow for automatic updates and scheduled scans.  Leprechaun Technical Services can help.
 

Leprechaun Technical Services ~ Established March 17, 2009
Copyright 2009-2015~ All Rights Reserved ~ Leprechaun Technical Services
This Website Designed By: Kathleen's-Graphics.com