Antivirus software is simply not enough. An email worm can spread worldwide in just minutes, but it takes hours for antivirus vendors to analyze, create, and deploy signature updates. Fortunately, there are five easy steps you can take to help close that window of vulnerability and help keep email worms off your system.
Rule 1: Identification - Understanding the nature of the attachment is the first step towards email safety. Any executable type attachment has the potential to be infected. This covers a wide range of extensions. Complicating matters is that, by default, Windows suppresses file extensions. Make sure you have file extension viewing enabled. {i]Hint: If you aren't sure what file extensions are, sign up for the free Windows Basics online course.
Rule 2: Intent - An executable type attachment should not be opened unless it was specifically requested or expected. Since email worms are sent to addresses found on infected users' machines, just knowing the sender is no proof of intent - they may well be infected. In fact, odds are an email worm will arrive from someone you know and the sender is oblivious to the viral email being sent from their machine. Worse, today's worms spoof the From address, so it may well be that it's not even from the person you think it is. If there's any question as to the intent, see Rule 3 below.
Rule 3: Necessity - This is the simplest rule to follow, but one that many people ignore. If you do not need the attachment, don't open it. Delete the email instead.
Rule 4: Secure your client - To date, many email worms and viruses have taken advantage of security vulnerabilities found in Microsoft Outlook and Outlook Express. However, any mail client that supports HTML and scripting should be considered at risk. For instructions on securing your particular mail client, choose from the list below:
TIPS TO SAVE OWN MAIL
8:16 AM
No comments
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment