Frequently Asked Questions FAQ

Security

What is malware?


Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. Also known as malicious software.




What is phishing?


Phishing is a type of online scam where criminals impersonate legitimate organizations via email, text message, phone calls, advertisement or other means in order to steal sensitive information. This is usually done by including a link that will appear to take you to the company’s website to fill in your information – but the website is a clever fake and the information you provide goes straight to the crooks behind the scam.




How serious is the malware threat?


  • Nine out of 10 PCs connected to the Internet are infected with spyware.
  • 88% of Spy Audit scans found some form of unwanted program (Trojan, system monitor, cookie or adware) on consumer computers.
  • Some form of spyware can be found on 87% of corporate PCs.




How does malware find me?


Even if you're careful, you can pick up malware through normal Internet activities.




How can I remove malware?


First, you should use a scan program designed for malware detection to see if you're infected. Once you know your infection level, you'll be able to take back control of your computer.




How can I prevent malware infection, viruses, phishing, and spam?


  • Just say "No!" to free software.
  • Increase your browser security settings.
  • Update your security patches regularly.
  • Avoid questionable Web sites.
  • Be suspicious of email and IM.
  • Use public or multiple-user computers with extreme caution.
  • Beware of peer-to-peer file-sharing services.
  • Use a firewall.
  • Use anti-virus protection.
  • Use the Mozilla Firefox browser.
  • Use a good anti-spyware product, not a free one.




Why do I need anti-malware protection?


If you use a computer, you're susceptible to malware infection. In fact, nine out of 10 Internet-connected PCs are infected with spyware that can:

  • Open your PC to identity theft.
  • Expose your personal information and private accounts.
  • Corrupt your hard drive.
Share your passwords and usernames.




Why can't free applications protect me from malware?


In every way, free applications lack the capabilities to remove malicious, complex malware. They also are not backed by the resources available to track and eradicate the latest malware threats. Malware is growing relentlessly more sophisticated. Free applications just can't keep up.




What should I look for in anti-malware software?


  • Regular definition updates
  • Refined malware detection
  • Proactive protection
  • Designated threat research team
  • Customer service
  • Easy-to-use interface
  • Stable company to back up the software




How can I prevent credit card fraud, data leakage, ransomware, and identity theft?


  • Use varied and complex passwords for all your accounts.
  • Continually check the accuracy of personal documents and deal with any discrepancies right away.
  • Only provide personal information on sites that have "https" in the web address or have a lock icon at bottom of the browser.
  • Do not provide personal information to any unsolicited requests for information
  • Avoid questionable Web sites.
  • Practice safe email protocol:
  • Don't open messages from unknown senders.
  • Immediately delete messages you suspect to be spam.
  • Avoid free software and file-sharing applications.
  • Use anti-virus protection and a firewall.
  • Get anti-spyware software protection.




How can I prevent hijacked homepages and PC crashes?


There are a few simple things you can do right away to help prevent further spyware infection and reclaim your homepage:

  • Update your operating system regularly.
  • Avoid questionable Web sites.
  • Practice safe email protocol:
  • Don't open messages from unknown senders.
  • Immediately delete messages you suspect to be spam.
  • Avoid free software and file-sharing applications.
  • Use anti-virus protection and a firewall.
  • Get anti-spyware software protection.




What is Data Leakage?


Data leakage is the unauthorized transmission of data from within an organization to an external destination or recipient. The term can be used to describe data that is transferred electronically or physically.

Sometimes, hackers want to steal your data so that they can hold it for ransom. This type of attack is a ransomware attack. Hackers usually execute ransomware attacks by gaining unauthorized access to data, then encrypting it or moving it and charging a ransom in order to restore your access to it.




What happens in a ransomware attack?


Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid for your system to work again. It can lock a computer screen or encrypt important, predetermined files with a password you have to pay to get access to.





(855) 644-4886

©2020 by InfoAge Solutions IAS