Prevent Computer
Virus Download

computer virus download slide

Keep a heightened awareness of the existence of computer viruses and the destruction that can occur when a PC is infected by one. For example, the threat of the Michelangelo computer virus download, received widespread attention.  Virus concerns prompt the installation of computer virus detection tools to prevent computer virus download

A computer virus is nothing more than software code, but this code can be destructive. In order for a PC to become infected, the code needs to be transferred to the PC and then executed. This most commonly occurs by means of an infected download or infected attachment to an e-mail message, which can come from a variety of sources.

How do Viruses Travel?

Several of these are listed below...

  • Pirated Software, Shareware, and Public Domain Software are common sources of viruses. This seems to be particularly true for games. People tend to share these among many users and the likelihood of a computer virus download infection increases accordingly. Try to steer clear of this type of software, or be sure to follow recommended anti-virus procedures.
  • E-mail letters, chain or other, especially with attachments containing .exe files, are very high on the likelihood scale of containing and spreading viruses. Don't open these, especially if from an unknown source.
  • Your Technical Support and Service Engineers can provide an effective medium for the spread of viruses. Diagnostic diskettes / CD's, used in resolving a problem on a customer's PC, can become infected and in turn infect other PCs.
  • Personal computers at home can also be sources of infection. When work is brought home, the USB sticks can become infected, and then one takes back the infection to the workplace.

Purchased Software is generally virus free. Major software vendors quality assurance procedures prevent the spread of viruses through their products. Plus, if purchase software contained viruses, it would kill that company's business.

To safeguard against infection, make sure you have anti-virus software on your PC and always scan USB sticks, downloaded software, and inbound e-mail messages prior to opening / use. If you have Microsoft Windows, turn on Windows Defender.

TrainingKeeper Software. Keep, organize and plan all your employees' training and activities. Software includes multi-user support with reports, certs, and calendars.

TrainingKeeper Software

Company Post Detection

Computer viruses cause much justifiable concern for all PC users.

What do you do when you think you have a computer virus download or someone warns you of a possible virus? if you think you may have a virus, first contact your PC help desk. Then follow the company procedures.

However, if you receive a warning such as many of us have via an e-mail message advising you to be aware of a virus, such as the "Good Times" virus, you should validate the information before sending it through your network.

The "Good Times" virus threat was a hoax. But, because people with good intentions relayed the warning throughout their networks and to friends in other companies, it had the same effect as a true virus. It caused people to take time away from their job to pass the warnings on, resulting in many hours spent not in a company's best interests. The initiators of the warning caused a disruption in business without really doing anything to your PC systems.

So, whenever you receive one of these "warnings", validate it before
you alert the world. It will save your company time. If it is a true virus, take proper action. If it is a hoax, defeat the purpose of whoever initiated it. To validate virus warnings such as this, contact your PC help desk or your favorite anti-virus vendor.

Types of Viruses

The big three are:

  • Virus - A program that can attach itself to another program (the host), and then causes damage to hardware, software, and files.
  • Worm - A stand-alone self-replicating program that can invade a  computer, consume memory, and cause it to crash.
  • Trojan Horse - A computer program that appears to be legitimate, but conceals an unexpected function which is usually damaging.

Employee Handbook Kit includes two Employee Handbook templates for Professional & Manufacturing. Includes over 60 policies and benefits templates.

Employee Handbook Policies & Benefits

What to Know:

  • Unless you have antivirus software installed on your computer, you won't really know if it has been infected. In many cases, a computer virus download can slow your computer's processing capability or trigger other unusual behavior, but these symptoms can also be caused by a number of unrelated reasons.
  • If you notice that your computer or Internet connection seems to be running without actually using it, or if your computer settings change, these are symptoms of an infection.
  • Antivirus software should be considered a vital part of any organization's defense against computer viruses. Antivirus software will not only prevent many virus infections, but will help the user detect and remove viruses.

What to Do to Prevent Computer Virus Download

Follow these steps to prevent computer virus download.

  • Install antivirus software on all office machines to monitor systems for suspicious virus-like behavior.
  • Keep current with the latest virus definitions by regularly visiting your antivirus software vendor's web site to download them, or by running scheduled updates to your antivirus software. Only then will your software be able to recognize the latest identified threats.
  • Educate all employees on antivirus software use.
  • Use scanning software in conjunction with memory-resident or integrity-checking software to provide the greatest degree of protection.
  • Scan all foreign CD's and USB sticks before use.
  • Regularly check your system to ensure that the antivirus software is resident and working properly.
  • Keep your operating system current with the latest software patches.
  • Keep your purchased software products current with the latest software patches.
  • Learn about/how to set the security features on your computer.
  • Install a firewall.

8D Manager Software with 8D, 9D, 5Y and 4M report generator. Your corrective action software for managing, measuring, and reporting issues.

8D Manager

What to Do if Your Computer Gets Infected

Once you have identified that you have an infection, download the latest virus definitions or updates from your antivirus software vendor's web site, and follow their directions to fix or remove the virus.

In most cases, if you download the latest virus definitions from your antivirus software vendor, that will take care of the problem. In some cases, you may also need to follow some additional steps to manually remove the infection from within your system. If you need further assistance, you can contact your antivirus software vendor for support in removing the virus.

You still need to be alert since many times a Trojan Horse is spread like a virus or with a virus, but may not show symptoms for a long time, if ever.

What to Consider:

  • Make sure any computer virus download alert you receive is real and not a hoax. If you've seen, heard, or read about a virus via a reputable news media source, it is probably real. However, if you receive an e-mail from someone you know regarding a virus alert, and they ask you to pass it along, don't. This is a common ploy used by virus creators to spread the infection. Instead of just forwarding a virus alert to contacts in your address list, first confirm whether or not the virus alert is real by contacting either your local PC support team or your antivirus vendor.
  • Be cautious about visiting unknown or unusual web sites. Staying on the main routes of the information highway will keep you safer.
  • Don't open e-mail attachments from anyone you don't know, and be cautious of attachments from people you do know. Some viruses spread by mailing themselves to contacts in an infected computer's address book. If you have any doubts about the safety of an attachment, check with the source before opening it.

By using discretion, and keeping your antivirus software definitions current, you can guard and protect your computer system from unplanned unavailability

Widget is loading comments...

More Info

  • Learn the steps to conduct software installation and upgrade process within your business to prevent mishap.

    Software Installation and Upgrade Process

    Learn the steps to conduct software installation and upgrade process within your business to prevent mishap.

  • Learn how to protect against phishing. This article identifies the most common phishing attacks and the steps your company can take to eliminate them.

    How To Protect Against Phishing

    Learn how to protect against phishing. This article identifies the most common phishing attacks and the steps your company can take to eliminate them.

  • Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.

    Building Security Checklist

    Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.

  • The future of computer security is biometric verification

    Biometric Verification

    The future of computer security is biometric verification

  • Learn how to backup computer data for company PCs. This article lists questions your company should ask when setting up a backup system.

    Backup Computer Data

    Learn how to backup computer data for company PCs. This article lists questions your company should ask when setting up a backup system.

  • This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.

    IT Audit Program

    This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.

  • This article discusses business methods to prevent scary emails such as legal liability issues and describes other risks for allowing them.

    Prevent Scary Emails

    This article discusses business methods to prevent scary emails such as legal liability issues and describes other risks for allowing them.

  • This article covers network security information which focuses on IT Policy, Information Security Awareness, and IT Compliance

    Network Security Information

    This article covers network security information which focuses on IT Policy, Information Security Awareness, and IT Compliance

  • Data protection tips for your company. This article covers important issues for business data protection and data recovery

    Data Protection Tips

    Data protection tips for your company. This article covers important issues for business data protection and data recovery

  • This article covers a detailed corporate email policy. You can also freely download this policy.

    Corporate Email Policy

    This article covers a detailed corporate email policy. You can also freely download this policy.

  • This corporate internet policy covers criteria, personal use, violations, best practices and more. Download it for free and use it for your business!

    Corporate Internet Policy

    This corporate internet policy covers criteria, personal use, violations, best practices and more. Download it for free and use it for your business!

  • Company Strike Preparation guidelines minimize company risks and downtime during a company strike.

    Strike Preparation Guidelines

    Company Strike Preparation guidelines minimize company risks and downtime during a company strike.

  • Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.

    IT Audit Tool and Guide

    Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.

  • This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.

    Information Security Notes and Policy

    This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.

  • This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security

    Computer Protection Security Guidelines

    This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security


Quality Assurance Solutions
Robert Broughton
(805) 419-3344
USA
email
Enjoy this page? Please pay it forward. Here's how...

Would you prefer to share this page with others by linking to it?

  1. Click on the HTML link code below.
  2. Copy and paste it, adding a note of your own, into your blog, a Web page, forums, a blog comment, your Facebook account, or anywhere that someone would find this page valuable.

All Products

Software, Videos, Manuals, On-Line Certifications

PDCA Complete

An Organizational Task Management System. Projects, Meetings, Audits & more

8D Manager

Corrective Action Software

TrainingKeeper Software

Plan and Track Training

Snap Sampling Plans!

AQL Inspection Software

QAS Business Slide Deck

450+ Editable Slides with support links

TRIZ Kit

Learn and Train TRIZ

ISO 9001:2015 QA Manual

Editable Template

ISO 9001:2015 QMS Kit

Templates, Guides, QA Manual, Audit Checklists

ISO 14001:2015 EMS Kit

EMS Manual, Procedures, Forms, Examples, Audits, Videos

On-Line Accredited Certifications

Six Sigma, Risk Management, SCRUM

All Products

Software, Videos, Manuals, On-Line Certifications