Despite all of my nagging about online security, computer users never seem to give enough attention to online security and protection UNTIL a virus or a hacker renders their computer useless or destroys their data. Once this happens, it can be very expensive if not impossible to repair the damages done.
If you own a computer that is connected to the Internet without proper firewall and security measures set up, it’s only a matter of time before a worm, virus, hacker, or spyware takes over your computer.
Cybercriminals lurk everywhere on the Internet and are constantly figuring out new ways to access your personal and financial information. Even legitimate Web sites have sophisticated methods of snooping, such as cookies and spyware, that track your identity, browsing habits, and personal information.
This month, I thought I would take some time to outline the 3 biggest threats to you online, and show you how you can keep your private information from falling into the wrong hands.
Threat #1: Hackers Small business owners and home users tend to think that because they are “just a small business” or “just a home user” no one would waste time trying to hack into their computer. Nothing could be further from the truth.
Just recently I conducted experiments where I connected a single computer to the Internet with no firewall. Within hours, over 13 gigabytes of space was taken over with malicious code and files that I could not delete. Hackers are malicious individuals who prey on unsuspecting computer users who have not properly secured their PC from outside access.
These cybercriminals run scanning programs over the Internet to find computers with electronic openings, called ports. Once they find such an opening, they have as much access to your computer as you do. That means your online banking, personal data, passwords, family data, and files. Often the goal of these intruders is to install a Trojan horse to your hard drive.
Here are some of the telltale signs that your computer has been hack:
- Mysterious files suddenly start appearing.
- Your CD drawer starts opening and closing by itself.
- You get constant run time errors in MS Outlook/Outlook Express.
- You find e-mails in your sent items folder that you didn’t send.
- Some of your files are moved or deleted.
- Icons on your desktop or toolbars are blank or missing.
- Your mouse feels sluggish, like someone else is trying to control it.
The best protection from a hacker is a good firewall. When properly set up, a firewall will make your computer invisible to the scanners and prevent hackers from accessing your computer.
Threat #2: Viruses, Worms, and Other Malicious Software A virus is a freeloading program designed to install itself onto your computer without your knowledge or permission. Once installed, the virus attaches itself to files or boot sectors with the intent of taking over your computer’s programs.
A worm is a parasitic program designed to replicate itself on your computer and then spread to other computers via email (through your address book) or an IRC (chat program). Both of these programs are considered “malware”, which is short for malicious software. Many of the worms on the Internet today have been designed by advertising agencies to gain lists of working email addresses for spam.
If you get a worm, not only are you affected, but also every person in your address book (friends, family, and clients). Most viruses are spread via e-mail attachments. That is why you should NEVER open any email attachment from someone you don’t know, or that looks suspicious.
Once the attachment has been opened, the computer virus will run on your computer and perform its intended function. Sometimes the computer virus is designed to delete specific files on the computer, send commands and information to other computers, or to wreak havoc on your computer in some other way.
It will also try to send copies of itself (also known as ‘spoofing’) to other email addresses that it finds in your email address book. In this way, the computer virus can spread across the Internet by way of an email.
You can also get a computer virus by inserting and reading infected floppy disks and CD-ROMs or by downloading files from the Internet. If you download music files or pictures from a peer to peer file sharing site such as KaZaa, there is a good chance you’ll end up with a virus.
The most important thing you can do to protect your PC from viruses is to install and regularly update your virus protection software. Many software programs offer an automatic update feature that will make it far easier to keep your PC safe.
Threat #3: Spyware If you spend a lot of time online, share music files or photos with other users, or if you download shareware or other Internet freebies such as emoticons, screen savers, or other “cute” programs, chances are your computer is infected with spyware.
Spyware is Internet jargon for hidden, undetected programs advertisers install on your PC to gather and report information about you and your online activities. This program is usually installed without the user’s knowledge by piggybacking on another program or file being downloaded. While some spyware is harmless, there can be serious consequences of unidentified spyware which include spam, identity theft, corruption and slowing of your PC, and annoying pop-up ads.
These programs can also profile your shopping preferences, hijack your browser start page, and alter important system files without your knowledge or permission. Unfortunately, spyware is not illegal even though it allows a complete stranger to monitor and store information about you and your online activities.
Here are some signs that your PC is infected with Spyware:
- You are constantly getting pop-up ads that seem to come from nowhere.
- Your Internet start page has been changed (this is the web site that normally comes up whenever you open your browser).
- Your search engine bar has been changed.
Some spyware and malware can be easily removed using a program such as Spybot’s Search & Destroy (you can download it for free at: www.safer-networking.org) or Ad-Aware (you can download it at www.lavasoftusa.com/support/download).
However, not all malicious programs can be removed – or even detected – using the above software. Many programs integrate so deeply into the operating system that it takes a skilled technician several hours to fully diagnose and remove the malicious program. In some extreme cases, we have had no alternative but to wipe the hard disk clean by deleting all of the files on it and re-installing the operating system.
Obviously, this is NOT and ideal situation and we do everything within our power to avoid it. Unfortunately, there are some malicious programs that are so intelligent that there is simply no other way of removing them.
Of course you can use Spybot or Ad-Aware as a first attempt at cleaning your machine; however, if you continue to notice that your computer runs slow, if you continue to get crippling pop-ups, or any other of the tell-tale signs discussed earlier, you will need to give us a call immediately before this malicious program does more damage to you and your friends, colleagues, and clients.
If you have questions related to this topic or IT issues in general, please feel free to contact us using the information provided below
Telephone: (408) 400-0232