Protecting your Computer from Malware and Hacking Attempts

Issue

How can I protect my computer from hacking attempts

 

Information

Protecting your computer

Malware is a shortened form of the term "malicious software", which is used to define any sort of program or computer code that is harmful to a computer or installed and ran without the users knowledge or consent. This software can be further classified into two categories. The first is the Virus group, and the second is the Spyware group. The virus group contains programs such as viruses, trojans, worms, backdoors, and bots, just to name a few. These are classified and named depending on different factors, such as how they spread and the actions they take. The spyware group contains programs such as spyware and adware, which silently observes a computer's user present unwanted information.

What is the difference between viruses, worms and trojans?

While similar in nature, the differences between viruses, worms, and trojans are as follows: 

  • Viruses are programs that attach themselves to files and replicate when the files they are attached to are used, either by opening a document for editing or running a program. Viruses require interaction with a user to spread. 
  • Instead of attaching to files, Worms run in a computer's memory and attempt to spread to other computers connected to the infected computer, either through a network or the Internet. Typically, the worm's programming is contained in a file that is activated when a computer starts up, or when a specific date, time, or action takes place. 
  • Much like the object of legend that it is derived from, a Trojan infects a computer by disguising itself as a file or program that initially seems benign and then tricks the user into running it, causing various different effects as it does. 

It is important to understand how your system can be exposed to them, and what you can do to protect your computer. Some common symptoms that could indicate your system's been infected are: 

  •     Unusual messages or displays on your monitor
  •     Unusual sounds or music played at random times
  •     Programs or files are suddenly missing
  •     Unknown programs or files have been created
  •     Some of your files become corrupted or suddenly don't work properly
  •     Your system slows down
  •     You cannot open certain files
  •     Programs that cease to work correctly
  •     Continuous system crashes
  •     An unusual or impossible date or time; for example, a minute or second value higher than 59.
  •     Upon booting the system, the screen displays an unexpected graphic such as a famous person or a holiday symbol you did not create.

Ways to Protect Yourself from Malware/Virus Attacks

  • Do NOT open any files attached to an email from an unknown, suspicious or untrustworthy source. 
  • Do NOT open any files attached to an email unless you know what it is, even if it appears to come from a dear friend or someone you know.  Some viruses can replicate themselves and spread through email. Better to be safe than sorry and confirm that they really sent it.
  • Scan removable media. If a co-worker or friend gives you a file on a USB drive or zip file you should scan the file for viruses before you copy it to your computer. You can do this by right clicking on the drive and then left click on “ scan for viruses”.
  • Keep your virus definitions up-to-date. When you log into the GRCC network your virus definitions are updated automatically. If you are not logging into the network on a daily basis because you have a laptop that you are taking home, you should be updating your virus definitions manually. 

Updating Virus Definitions Manually - Windows Defender

The following provides instructions on how to check the security status of your device and update your virus definitions for Windows Defender

  1. Navigate to the Windows Search bar (magnifying glass) in the left-hand corner of your screen
  2. Search for Windows Defender
  3. The Windows Defender dialogue box should be up-to-date and say "Your PC is being monitored and protected."
  4. To check for updates/perform an update - Navigate to the Update tab
  5. Select - Update definitions - to receive the latest update on virus definitions.
Print Article

Related Services / Offerings (1)

Information Technology's malware handling procedures.