Century IT blog

Have you become a Zombie?

January 7th, 2008

New computers or freshly wiped and reinstalled computers pose little or no threat to your online safety, it is not until you start surfing the internet, downloading files or perhaps receiving emails that you start to be at risk. The majority of people simply don’t realise or are unaware that the internet poses a security risk to your computer network and privacy.

 

  • Have you ever had an email from the bank asking for your passwords? Really?

 

  • Do you often get SPAM emails?computer bugs, computer viruses

 

  • Have you ever downloaded something from the internet?

 

  • Have you ever sent a private or sensitive email thinking no one would read it?

 

  • Ever surfed the internet and ended up at suspicious website?

 

  • Ever received a funny joke email from a friend?

 

If you have answered yes to any one of the questions above then your computer security could be compromised!

 

Banks never send IT support, computer support, network supportemails asking you to confirm your account details; they already know your details and go to great lengths at sending you secure letters via the royal mail postal system. If you have mistakenly replied or given your details, I would suggest you urgently contact your bank.

 

There are varying different types of SPAM emails, some maybe from legitimate companies you have registered your details with, e.g. suppliers, partners or customers. These emails, although they maybe flagged as SPAM or potential SPAM by your computer system, are probably only being sent to you after you consented to be included on mailing lists.

 

You may receive other emails which include subjects such as Rolex watches, Viagra or online chemists, these are probably SPAM and you should be careful opening these emails or clicking on links or attachments.

 

If you click on one of these links, many things can happen, you could inadvertently:-sypware, malware, key loggers, viruses

 

  • Download and install a Trojan horse
  • Install a Malware program
  • Install a Key loggers
  • Install Spyware

 

[For information on the above see our blog article]

 

 

A lot of people think that they can send a private email and it will remain private as long as no one looks over their shoulder before they hit the send button, this is very important misconception.

 

The ability to send a letter electronically via Email has become a major convenience to many people. Before the wemail delivery, email systemside take up of Email, historically we would have sent letters via the Royal Mail postal system, secure in the knowledge that the letter would not be opened until it was received by the recipient.

 

In the electronic world, as your email travels from source to destination it travels through many computer systems, people can intercept, read your emails, take copies, tamper with them or even forward them to someone else without your knowledge.

 

I have been in the IT industry for many years and have seen many things; a couple of recent notable events were two separate, unrelated email correspondences from a Solicitor and an Accountant, both obviously containing private and sensitive information. It made me pause to consider whether my data protection rights were being violated and if the Accountant or Solicitor were aware of the dangers. As a rule you should not send private or sensitive emails as they will not be private for long!

 

Were you aware that a lot of jokes forwarded by your friends and family, even if they are Excel or Word documents can contain macro viruses?

 It security, IT assets, IT audit,

Most people are aware that Internet Explorer records a history of which websites you visit and when and then clears down the history when the information expires. Were you also aware that there is a hidden internet surfing history log which is not normally deleted, this logs contains the ‘forever log’, all the surfing history!

 

Microsoft Internet Explorer 8 now includes a new feature called “In Private Browsing”. When you visit an online banking or other secure web site, would you want a record of where you went and how often you went there? The “In Private Browsing” options allows you to surf the internet more securely by preventing Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default.

 

When considering the subject of computer network security a holistic approach should be taken.  Properly installed and supported computer networks should have layered security; starting at the perimeter of the network, and ending with robust security policies on the user’s computers.

 

Century IT Services offer a range of support options to suit different types of business and budgets. We are particularly skilled in fault finding on some of the most troublesome computer networks.

 

Do you know what software is installed on your computer systems?

 

 

Century IT Services – Getting IT Right
Providing Computer Support & Network Support to businesses in Hampshire, Dorset, Surrey, Wiltshire, Sussex & Berkshire