In Part 1, I want to highlight some basic do's and dont's.
These are not exhaustive, but they do serve as a solid platform to work from.
So in no particular order, they are:
DONT'S:
DO NOT open e-mail attachments with the following file extensions, even if you know the sender: .ade .adp .asx .bas .bat .chm .cmd .com .cpl .crt .exe .hlp .hta .inf .isp .isp .js .jse .lnk .mda .mdb .mde .mdz .msc .msi .msp .mst .pcd .pif .prf .reg .scf .scr .sct .shb .shs .url .vb .vbe .vbs .wsc .wsf .wsh
Even though the.doc/x &.xls/x file extensions have not been mentioned above, BE CAREFUL. Word & Excel documents can contain harmful Macros (A mini-program which will execute a series of commands in series). Also, it is now possible to infect a computer through some image file formats, primarily the WMF format, and recently JPG and BMP formats. This vulnerability can be addressed by making sure that your system is up to date with all Microsoft security patches. In addition, Adobe PDF files can be crafted to incorporate malicious content, so make sure you keep Adobe Reader up to date too.
DO NOT use Floppy Disks or USB Drives from unknown sources unless scanned first using your antivirus software, & even then be careful.
DO NOT believe any e-mail that tells you to delete Windows files stating that the virus cannot be detected by antivirus software. A lot of the time this is a hoax that tricks you into deleting critical Windows system files.
These are not exhaustive, but they do serve as a solid platform to work from.
So in no particular order, they are:
DONT'S:
DO NOT open e-mail attachments with the following file extensions, even if you know the sender: .ade .adp .asx .bas .bat .chm .cmd .com .cpl .crt .exe .hlp .hta .inf .isp .isp .js .jse .lnk .mda .mdb .mde .mdz .msc .msi .msp .mst .pcd .pif .prf .reg .scf .scr .sct .shb .shs .url .vb .vbe .vbs .wsc .wsf .wsh
Even though the.doc/x &.xls/x file extensions have not been mentioned above, BE CAREFUL. Word & Excel documents can contain harmful Macros (A mini-program which will execute a series of commands in series). Also, it is now possible to infect a computer through some image file formats, primarily the WMF format, and recently JPG and BMP formats. This vulnerability can be addressed by making sure that your system is up to date with all Microsoft security patches. In addition, Adobe PDF files can be crafted to incorporate malicious content, so make sure you keep Adobe Reader up to date too.
DO NOT use Floppy Disks or USB Drives from unknown sources unless scanned first using your antivirus software, & even then be careful.
DO NOT believe any e-mail that tells you to delete Windows files stating that the virus cannot be detected by antivirus software. A lot of the time this is a hoax that tricks you into deleting critical Windows system files.