Security Reminder

posted Jan 20, 2010, 9:41 AM by Jim Gach
There are a number of Internet Threats and Exploits that have surfaced over the last several weeks.  Although some of these issues do not have fixes at this time, there are a number of things you can and should do to help protect your Windows Workstations.  Many of the steps outlined below can be performed with assistance from the specific website of the software company.  Since the precise steps depend on the details of your particular system we are unable to provide step-by-step instructions.  We can also help you with these steps, if you prefer.  Please call the office at 816-453-3031or reply to this email to schedule an appointment.

DO
  • Windows Updates:  Make sure Automatic Windows Updates are turned on.  Make sure the latest updates have been downloaded and installed.
  • Internet Explorer:  Make sure Internet Explorer 8 is installed with the latest updates.
  • Use an alternative browser when possible, such as updated versions of Google Chrome or Mozilla Firefox.
  • Anti-virus Software:  Make sure whichever Anti-virus Software is installed, it is up-to-date and the latest definitions are installed.  According to the Symantec Web Site the most popular threats will not affect systems with the latest AV definitions, 1/18/2010 or later.
  • Adobe Reader:  Make sure version the latest version 9.3 is downloaded and installed.
  • Download and install the latest Java updates or uninstall and disable Java if it is not necessary.

DO NOT
  • DO NOT Visit web sites that are not necessary for your work or that are "just for fun".
  • DO NOT Click on links within emails from untrusted or unknown sources.  Many times these links do not take you to the web site indicated in the link.
  • DO NOT Click on links within a window that pops-up automatically on your computer.  There are several exploits that pretend to be a Security Tool and will ask you for additional information including credit card or personal information.  If you suspect that your computer has become exploited, stop what you are doing and give us a call, so we can assess the situation.
  • DO NOT open any attachments unless you are certain of their origin, the file type and the purpose.   Make sure that when you send an attachment that you refer to the attachment in the body of the message,  explain the file type and program needed to open attachment and indicate why the attachment is included or what the attachment contains.
Comments