Zebis - Information Technology
navagation bar About Zebis Solutions White Papers and News Newsletters ZRA E-mail Contact
Direct Links >> Business - Residential - Managed Service - Home
Avoid Computer Viruses -- Protect Your Privacy

People expect that someday a virus will attack their computer. They think it's a way of life these days. It isn't! No one should ever get a virus. There are so many words used when people talk about viruses. No matter what it's called, when your computer is attacked by something you didn't want, a virus, the information on your computer is totally vulnerable.

Most computers today are insecure. They are insecure whether or not the computer is at home or in the outside world. An insecure computer means that someone from the outside can read data on the computer and even change, eliminate or add files. To make matters worse, the computer owner would have no immediate clue that files were read, viruses were added or that important, private information was made available to the public. It might take some time before evidence that your privacy was violated is revealed.

Most computer users do not realize how insecure their computer systems may be. Without adequate protection, all financial data stored on the computer is easily accessible to the outside. Viruses and spyware (software capable of reading your work and sending information to others) can be secretly added to the computer. If such an attack takes place, privacy is compromised, the computer may stop functioning or vital files may be deleted, or (worst case scenario) the user may be the victim of identity theft.

Even a mild virus can cause severe damage and require that all programs and files be removed for the offending threat to be eliminated. Subsequent re-installation of all programs, files, printers is needed to return the computer to full working order. This reinstallation will take a lot of time: probably more than five hours.

However, don't panic -- there is good news!. Just a few simple steps will eliminate the chance of a virus and minimize, if not eliminate, the chance of personal files and data being visible to outside computer users. These are the five steps: use only secure software, use hardware firewalls, use EAP wireless, never open possible unsafe files, and use good, VERY good, anti-virus software.

Look for future articles from Zebis where we will detail the five specific steps listed above and move all users toward full protection of computer privacy.
blue line
© 2009 All rights reserved. contact