Issue
How can I protect my computer from hacking attempts
Information
Protecting your computer
Malware is a shortened form of the term "malicious software," which is used to define any sort of program or computer code that is harmful to a computer or installed and ran without the user's knowledge or consent. This software can be further classified into two categories:
- The Virus group contains programs such as viruses, trojans, worms, backdoors, and bots. These are classified and named depending on factors such as how they spread and the actions they take.
- The Spyware group contains programs such as spyware and adware, which silently observe a computer's user and present unwanted information.
What is the difference between viruses, worms and trojans?
While similar in nature, the differences between viruses, worms, and trojans are as follows:
- Viruses are programs that attach themselves to files and replicate when the files they are attached to are used, either by opening a document for editing or running a program. Viruses require interaction with a user to spread.
- Instead of attaching to files, Worms run in a computer's memory and attempt to spread to other computers connected to the infected computer, either through a network or the internet. Typically, the worm's programming is contained in a file that is activated when a computer starts up, or when a specific date, time, or action takes place.
- Much like the object of legend from which it is derived, a Trojan infects a computer by disguising itself as a file or program that initially seems benign and then tricks the user into running it, causing various harmful effects.
It is important to understand how your system can be exposed to them and what you can do to protect your computer. Some common symptoms that could indicate your system has been infected are:
- Unusual messages or displays on your monitor
- Unusual sounds or music played at random times
- Programs or files are suddenly missing
- Unknown programs or files have been created
- Files become corrupted or suddenly do not work properly
- Your system slows down significantly
- You cannot open certain files
- Programs cease to work correctly
- Continuous system crashes
- An unusual or impossible date or time (e.g., a minute or second value higher than 59)
- Upon booting the system, the screen displays an unexpected graphic
Note: If you are concerned that your computer might be infected, please call the Support Desk at x4357 immediately.
Ways to Protect Yourself from Malware/Virus Attacks
- Do NOT open any files attached to an email from an unknown, suspicious, or untrustworthy source.
- Do NOT open any files attached to an email unless you know what it is, even if it appears to come from someone you know. Some viruses replicate themselves and spread through email contact lists. Confirm with the sender if you were not expecting an attachment.
- Scan removable media. If a co-worker or friend gives you a file on a USB drive or a zip file, you should scan it for viruses before copying it to your computer. You can do this by right-clicking on the drive and selecting "Scan with Windows Defender" (or your installed antivirus).
- Keep your virus definitions up-to-date. When you log into the GRCC network, your virus definitions are updated automatically. If you are using a laptop off-campus for extended periods, you should update your virus definitions manually.
Updating Virus Definitions Manually - Windows Security
The following provides instructions on how to check the security status of your device and update your virus definitions for Windows Security:
- Navigate to the Windows Search bar (magnifying glass icon) in the taskbar.
- Search for Windows Security and open the app.
- Select Virus & threat protection.
- Under the Virus & threat protection updates section, click on Protection updates.
- Select Check for updates to receive the latest virus definitions.