Desktop – Leaderboard

Home » How to safeguard from a compromised computer

Posted: June 28, 2015

How to safeguard from a compromised computer

By Sandy Oates

Columbia Computers

So, what are you doing to ease your email security worries?

As you are probably aware most computer viruses, malware and other various security breaches originate with your incoming email. It can be anything from a link to a website with files containing malicious code, emails asking for personal information or simply auto-running scripts that are triggered by opening an attached file.

A few things you can do to alleviate many problems is to quickly review your emails when they arrive and delete those you deem either suspect or really do not need. If an email contains a link requesting a response from you just hover your mouse over the link and a text box will pop up showing you the website information.

Check that information to make sure it is a legitimate website for the information requested. Generally you should never be asked to update personal information through a web-link in an email. It is also very tempting to open files attached to an email but if it is something you have not asked for or were not expecting don’t open it.

Malicious auto-running scripts and macros can be contained even in something as simple as a PDF file. Opening that file can easily install viruses or various types of malware.

I receive many emails every day and what I do when checking my email accounts is to first check my in-box in my provider’s web-mail page and delete any emails that I think are spam, malicious or just something that I just really don’t require. That way they don’t even make it to my computer’s hard drive.

This is just a quick overview of what you can do to help safeguard yourself from having a compromised computer.

Columbia Computers is located in Silver Springs, Cranbrook.


Article Share
Author: