by James Valle

To limit any malware, spyware and or virus infections, take precautions when accessing the internet via you’re browser, e-mail or other avenues. We are starting to see an unusual high volume of clients getting infected within the last couple of weeks with all types of malware infections which can cause a variety of problems, such as key loggers, browser hijacking, constant advertisement bombardment, hidden\deletion of files or install other malicious programming code.

Here are some precautions you can take:

– Do not click on links in your e-mail or websites you are not familiar or not sure about. When you download files, make sure you know what your downloading and installing. Know who is sending you e-mail and do not open if your not familiar with the person or e-mail.

– Make sure you have anti-virus/anti-malware/anti-spyware software installed on your computer and make sure the definitions are updated. Run daily or weekly scans. If you cannot run updates and automatic scans, especially if you are using “free” anti-malware/spyware software, manually update, run the scans and remove infections if found.

– Install a good firewall, like “free” ZoneAlarm or just customize the built-in firewall that Microsoft XP, Vista or 7 came with.

– Make sure you are installing updates for Java, Adobe Flash, Reader and Shockwave when you get the pop-up messages, don’t ignore them.

– If you have kids, monitor their surfing habits. Kids like to play online games and a lot of online gaming sites get infected and in return infect your computer. This even pertains to other certain sites like Youtube.com, since Youtube video’s use Adobe Flash. Setup limited access account profiles for your kids so they do not start downloading infected programs. Also, set limitations for them on the web browser (Chrome, Firefox, Internet Explorer, or Safari) so they won’t be going to bad and or infected sites.

If you need help or assistance, please call us at 240.892.0282 or e-mail us service@jtechinc.net

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,