Avoiding Harmful Email, Software, and Hackers

Summary

Every day you receive email messages with attached documents, photos, or other electronic files.
Sometimes these attachments contain destructive viruses, Trojan horses, or spyware, sent intentionally by someone who intends to cause harm or steal sensitive personal information.

Body

Overview

 

Harmful Email Attachments

Every day you receive email messages with attached documents, photos, or other electronic files.

Sometimes these attachments contain destructive viruses, Trojan horses, or spyware, sent intentionally by someone who intends to cause harm or steal sensitive personal information.

 

Harmful Software (Malware)

Malware is a shortened term for "malicious software." Malware is software designed to infiltrate or damage a computer without the owner's consent or knowledge.

There are many types of malware, including:

  • Viruses: malware that spreads from computer disks, CD-ROMs, and other storage media.
  • Worms: malware that spreads through network connections.
  • Rootkits: tools used by hackers that are hidden on a computer and used to maintain remote access and control of the computer.
  • Trojan horses: malware disguised as a normal computer file or program, such as an image, music file, spreadsheet or word document. When a user opens the file, the malware is launched and infects the computer.
  • Botnet: malware that uses a computer for inappropriate purposes, turning the compromised computer into a "zombie computer." Botnet can be used for activities such as sending out spam emails and launching denial of service attacks against other computers.
  • Spyware: malware used to capture user IDs, passwords, and other sensitive information typed from your keyboard.

 

Detail

 

Protect yourself from harmful email attachments by taking the following steps:

 

Hackers

Hackers take advantage of vulnerabilities in computer software and operating systems. They use computers for illegal purposes, to vandalize systems, or to gain unauthorized access to resources.

The best defense against hackers is to:

  • Ensure that your workstations and servers are behind an Enterprise Network Firewall.
  • Keep software and operating systems up-to-date with the most current security patches.
  • Use strong passwords that can't be easily guessed.
  • Never share your computer user ID or your password.
  • Use security tools that can detect or block hacker utilities.

If you believe your computer may have been compromised by a hacker, contact the Technology Help Desk at 412-624-HELP (4357) for assistance.

 

Details

Details

Article ID: 47
Created
Tue 7/18/23 9:42 AM
Modified
Tue 11/5/24 8:00 AM

Related Services / Offerings

Related Services / Offerings (1)

SECURITY CONSULTING AND EDUCATION KnowBe4 provides security awareness resources to train, promote and reinforce information security best practices.