Tag Archives: files
Church Virus Protection – 10 Ways To Improve Your Data Security
This day in age many churches are utilizing the resources the internet has to offer to spread the word and information on events to their partition, but they are unaware of the danger that their office computer is in from viruses and spyware attacks that are commonplace in the digital world.
If a church office computer contracts one of these viruses that data stored on your churches computer files can be compromised, stolen, or lost without virus protection in place. Statics show 80% of the time the church in question has not implemented any virus protection at all.
While these kind of attacks happen more often then most are aware of there are a few things that can be done to assure that your churches files and information is protected.
In order to help improve your church virus protection here are 10 ways to prevent hackers from infiltrating your system.
Install reliable anti-virus software (this is the best way to prevent viruses)
Never automatically open email attachments. Many times hackers will send a virus via email. All you have to do is open this email and your are infected
Scan all incoming email attachments before opening them. Anti-Virus protection will be able to alert you if any suspicious code exist within the attachment that could endanger your church data security
Configure anti-virus software to automatically boot when you start you computer. This works well because you will never forget to turn on the ant-virus software.
Update your anti-virus software frequently. By doing this church is assured protection from new viruses that arise.
Do not download programs from the Web from sites that you do not trust especially freeware or shareware sites, which are notorious for containing malicious scripts.
Do not boot with a disk in the drive. If the computer is booted with a disk in the drive it will automatically loads the disk. If the disk is infected it will load on to the computer without the option to scan it.
Do not share disk or usb memory drives. You do not know what or where the other person has been downloading from and you may get exposed.
You should always scan disks before using them. Anti-virus software will be able to determine whether or not a disk has been infected or not and in most cases remove the files that are corrupt.
Use common sense when using the internet. If you feel there is something wrong with a site or receive an email from someone you are not sure of their intent then chances are something is not right.
Following these 10 steps will substantially improve your church virus protection. By preventing a virus to infect your PC you protect your church and all your members. No church wants to find out that a malicious virus has wiped out all the office records. Utilizing these 10 steps will assure that this never happens.
All About Computer Viruses (Page 1 of 3)
Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just wont seem to open.
You might have a virus.
Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?
Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses dont bother to seek your permission at all! Very invasive.
In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guys consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.
In this article, though, were not talking about the good guys, or the agents. Well be talking about the bad guys, the viruses.
A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.
When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.
Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but theyre not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)
These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.
As far as web browsers are concerned, Microsofts Internet Explorer takes most of the heat for spreading viruses because its used by more people for web surfing than any other browser.
Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.
For instance, lets say you go to a website in IE you have every reason to think is safe, Nachenberg said.
All About Computer Viruses (Page 1 of 3)
Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just wont seem to open.
You might have a virus.
Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?
Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses dont bother to seek your permission at all! Very invasive.
In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guys consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.
In this article, though, were not talking about the good guys, or the agents. Well be talking about the bad guys, the viruses.
A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.
When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.
Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but theyre not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)
These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.
As far as web browsers are concerned, Microsofts Internet Explorer takes most of the heat for spreading viruses because its used by more people for web surfing than any other browser.
Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.
For instance, lets say you go to a website in IE you have every reason to think is safe, Nachenberg said.