(608) 755-1524 sales@computer-center.com

Back in 1992, I found myself secretly excited to find that our company computer had the Michelangelo virus, and was curious as to the turmoil that would ensue once it awoke from michelangeloits dormant state on March 6, which is the birthday of the famed renaissance artist. The virus was spread via infected floppy disks, and would propagate when a user mistakenly booted their PC with a floppy in the drive. Once the PC was infected, it would infect any floppy disk inserted into the PC. Being that this was in the age of “sneaker net”, this was how users commonly shared files between PCs. “Darlene, can you print the WordPerfect file that is on this disk?” Bam. Infected! The virus was also unknowingly distributed by some major software and computer manufacturers such an Intel, who didn’t realize the virus lay hidden on their floppy disks and hard drives. The irony is that Intel also had its own antivirus product.

While you may read many articles on how to protect yourself against viruses, which virus protection software is best, etc., it is my belief that the most effective prevention lie in your fingertips – You!

Malware Sources

Programs

At times I need a utility to perform some function like convert a file from one type to another, which often takes more time to locate then to complete the task. It’s best to start your search as reliable sites such as download.com and majorgeeks.com, as well as many others.

reliablesearchA search of “reliable software download sites” on Google led to several articles with reviews of various sources.

Also, while the file itself may not contain an infection, it may contain other piggy-backed programs designed to track your where-abouts on the ‘net and deliver advertising in the form of pop-ups, or install toolbars that hijack your web searches.

While installing software, pay attention to the wording at each step of the install. Most will give you an option to omit the install of the extra software, and will also cunningly phrase questions that trick you into allowing the additional programs. You can also check your “Programs and Features” in the Control panel and sort by “Installed On” to see what may be new and unknown. (The ability to see when programs have been installed on XP doesn’t exist.)

Cracked Software

Surely there is a reason someone offers a costly program for free, right? Do you really need that software, or can you find a more cost-effective alternative that will give you most of what you want? With many software manufacturers like Microsoft and Adobe offering monthly subscriptions to software that is otherwise out of many people’s budgets, there are more reasons to go legitimate.
And if you are installing unlicensed software at your office, be prepared to explain its existence to the BSA and face possible fines. The practice of software audits at companies has become much more common, as the BSA offers rewards for a report that results in an investigation that leads to a monetary settlement. I witnessed one company ordered to relinquish nearly a dozen PCs with unlicensed copies of Windows and have them destroyed, or otherwise face massive fines.
More reading on the BSA: http://www.bsa.org/anti-piracy

Email attachments

This is one of the most common sources of virus infections, arriving in a legitimate-looking email from a delivery company, friend, or law-firm announcing that you are going to be infectedemailsued. (Finding you are going to be sued really brings you down from the rush after the previous email announcing you have inherited 1 billion dollars from some unknown relative in Russia.) These types of emails contain attachments that lure the unknowing recipient into reading its contents.

Ring ring.. “Computer Center? My computer says it has a virus. I was just checking to see why my UPS delivery was delayed, HELP!”

If it’s questionable, ask your friend if they sent the email, or forward it on to your IT support people.

Further reading:
Snopes.com—about the Package Delivery Virus: http://www.snopes.com/computer/virus/ups.asp
UPS.com—examples of fraudulent emails: http://www.ups.com/media/en/fraud_email_examples.pdf

Social-networking

You have a friend who posts pictures of their family on Facebook, and one day posts a link to “You gotta see this!” Beware – their account may have been hacked, or they did the same thing you are about to do, which was click on a malicious link that someone else unknowingly posted.

facebookBe careful with what you allow access to your Facebook account, and occasionally check your App Settings to see what you have granted access to and who can see it. These settings are found under Settings | Apps. You can edit the privacy for each app, or turn off the feature all together.
Additional tips: https://www.facebook.com/note.php?note_id=10150162049491602

Malware Prevention

No software or hardware solution can completely protect your computer against infection, which is why your best action is recognizing common sources. However, as “security holes” in your browser or operating system are often found by their manufacturers after the creators of the malicious software took advantage of the vulnerability, you should protect your PC with current and reliable antivirus software.

There are many different antivirus software products available, for businesses we recommend a centrally-managed solution that gives

happymalwareyour IT person a single console in which they can see the status of each PC on the network. This prevents the issue with expired software, outdated virus definitions, unreported malware infections, and assists in clean-up should your PC become infected.

Hardware solutions like Barracuda, which acts as a web and email filter, can block access to malicious websites and infected email attachments.

Keep your desktop and server operating system up-to-date with security patches, service packs, and individual program updates. While your PC or server may automatically install updates, there are updates that need to be manually installed as well. The Computer Center can supply a free technology assessment to determine what issues should be addressed.

In Conclusion…

If you unsure about the legitimacy of an email, whether software you are trying to install is safe, or if your network is properly protected, please call our support people at The Computer Center. Fifteen minutes of time can save your company thousands of dollars in support costs to repair damage from a malware infection.

by Michelle Widell, Senior Engineer

Michelle