Tuesday, 3 May 2016

Common threats to computers, basic countermeasures, options once you're breached?


Since the introduction of online computing, privacy and security issues have been the number one concern for most users. We have all been there, browsing the web and watering our online crops, when suddenly the screen freezes up, and you are forced to watch the tiny pixelated plants wilt before your eyes. Helpless and defeated, you watch as a computer virus destroys your life's work. What could be worse than being infected by a computer virus? Not knowing what to do next. Threats come in many forms and it can be difficult to isolate a single source or weak point in your network. It can be even more difficult to fight back against a virus and eradicate it from your computer, once preventive measures have failed.

The most common computer threats are manifested in the form of viruses or trojans. A virus is a program that steals data or slows down a computer by pumping it full of bloatware and adware. A trojan, aptly named, is like a Trojan horse in virus form. It is a similar type of program, but it often lays dormant before activating. These types of programs can be installed on a computer through an email attachment, watching an online video, software download, or even through a USB thumb drive inconspicuously inserted into your machine as you are waiting in line for a coffee refill in between bursts of creativity. Due to the variance in which they infect your machine, it can be difficult to locate the source of an outside threat, therefore, firewalls and other preventive options are a crucial first step.

 Firewalls prevent unwanted access to your machine, and operate by restricting internet traffic. Most PCs and Macs come with an option to turn on a firewall that can greatly reduce the risk of being infected. Still, however, once turned on, a firewall may prevent some programs from performing properly. Knowing how to adjust Firewall settings and permissions l will ensure only approved internet traffic is passing through to your machine. There are programs you definitely want to communicate online. Setting the correct permissions will allow only approved programs to communicate with the outside world. While these settings may be difficult to find and adjust, it is worth the time to adjust them or have them adjusted, ensuring you can compute efficiently and securely. We here at AEmidio we are only a call away and are happy to help with any of these situations.


 While preventing these threats from compromising your data is the number one line of defense, they do not always work with 100% accuracy. Therefore, there are options available when a second line of defense is needed. With the ever changing world of malicious programming, it is becoming harder and harder to know what to protect. I for one have tried my hardest to stay safe while browsing, and only use trusted websites, yet I still get occasional viruses that put a damper on my day. Antivirus programs are great at removing threats, assisting in the protection of your data, and ensuring you don't miss a guild raid and an important business deadlines. There are a ton of options available for antivirus solutions, knowing which is the best, or at least not a total waste, is crucial. Since some hackers know no bounds, they have disguised viruses as antivirus programs, as if the world knows no greater evil. The best bet is to obtain a trusted service from a well known and reputable source such as McAfee, Norton, AVG or AEmidio. We have a Proactive Antivirus solution available in our AEmidio Services. The difference between McAfee, Norton, or AVG type antivirus and AEmidio Service is that we monitor for virus intrusions and proactively fix them where other antivirus software requires you to take action we provide the action for you. Most compromised systems can be restored to their former glorious selves with a good cleaning program and a restart, although some issues require a more thorough, and potentially traumatic if not done properly, course of action.

Computer reformatting is a last ditch effort when it comes to removing a virus. The process completely wipes your computer's hard drive in an attempt to remove the virus and any trace it may have left off. In a manner similar to those necessary for spider removal, eradication of everything the virus ever touched may be the best, and only sufficient, method. However, when reformatting a disk drive, it is crucial to backup all of your files so nothing important is lost. This is a simple task that can save you from a future headache.

No comments:

Post a Comment