Cybersecurity requires vigilance

By:

Cybersecurity requires vigilance

Be afraid.  Or even better, be afraid and alert.  You and your computers are vulnerable to cybercrime:  hacking and viruses, which lead to crashes and the loss of your data, sensitive information and money.

Victor Leal owns CyberNation, a computer services company. He is also a Harlingen City Commissioner.
Victor Leal owns CyberNation, a computer services company. He is also a Harlingen City Commissioner.

If your computer is running slower than before, you probably have a virus, according to Victor Leal, owner of CyberNation. Even with reliable antivirus software from AVG, Norton or MacAfee, computer viruses along with malware, worms and Trojan horses can infiltrate your system.

“You open the door and let them in when you click on or link to any number of innocent-looking Web sites,” Leal told a rapt audience at the Harlingen Chamber of Commerce’s monthly Lunch & Learn lecture.

Links in social networking can take you to infected Web sites.  Opening photos and movies are a major way of giving a Trojan horse access to your computer.  Music and adult sites are notorious sources of viruses, which sneak in the back door, so to speak.

Emails are being hacked at a horrendous rate, too, Leal said.  How many emails have you received from distant friends and business acquaintances saying “I’m stranded in Kalamazoo” or “Watch  this great golf video” or an empty mail with only a Web site link?  Click on any of those and you run a high risk that bad things will happen.  Beyond opening the door to annoying and virus-carrying messages going to everyone in your contact lists, the simple click could delete your entire address book.

So instead of cowering or disconnecting from the Internet, what can you do to protect your hardware, your data and your bank account?

Leal said, first, use only a paid version of an antivirus program. “The free ones leave out vital elements. And running two antivirus programs does not double your protection,” he explained. Instead, it undermines them both, rather like the way two little leaguers miss the ball that comes down between them.  In addition, beware of free, rogue security software, such as Internet Security 2012.

Second, Leal said, when your programs inform you of an update, install it immediately. Java, Flash and Windows, for example, put out updates after they find a breach in their system. You need to keep your guard up and use the protection they are offering you.  Remember to uninstall previous versions of Java.

Is your toolbar filled up?  Leal said many free toolbars support adware or malware, which at best slow your computer down and data mine or send information about you and your system to third parties.  “Get rid of everything in your toolbar you do not recognize.  If you find you do need it, you can re-install it,” he said.  “Deleting toolbars usually speeds things up and reduces the avenues for sneak attacks.”

Be wary and run you mouse over an email sender’s name or a link before you click on it.  That will expose the true sender.  Learn what an email address extension will get you.  Avoid .ru, which indicates a Russian site.  Equally dangerous are .exe, .bat .zip, .pdf, and .pif.   If an email looks strange, don’t open it. Delete it.   Do not hit unsubscribe on strange email.

To read the rest of this story by Eileen Mattei, pick up the October 2013 edition of Valley Business Report or read it online via the “Current & Past Issues” tab on this Web site.

Freelance writer Eileen Mattei was the editor of Valley Business Report for over 6 years. Her articles have appeared in Texas Highways, Texas Wildlife Association, Texas Parks & Wildlife and Texas Coop Power magazines as well as On Point: The Journal of Army History. The Harlingen resident is the author of five books: Valley Places, Valley Faces; At the Crossroads: Harlingen’s First 100 Years; and Leading the Way: McAllen’s First 100 Years, For the Good of My Patients: The History of Medicine in the Rio Grande Valley, and Quinta Mazatlán: A Visual Journey.

Comments