(Article originally written for 50 Plus Lifestyle Magazine)
Internet Security
Personal computing has certainly opened up whole new worlds for many people, giving them access to resources, information, family members, and friends in ways that would otherwise not be possible. Computer training courses at Madison-area neighborhood and senior centers are understandably very popular and quite valued for those wishing to learn the basics of being better connected to the rest of the world through the internet and email. Unfortunately, this connectedness comes with the risk of being exposed to an ever-growing smorgasbord of internet security threats that cannot be ignored.
Internet Threats
The term can send chills up the spine of many computer users these days. The range, scope and sheer volume of internet security threats has gone exponential in the last couple of years, especially for Windows-based personal computers. Damage from these threats can lead to many problems including overall system slowness, error messages, out of control web pop-ups, terminal system freeze-ups and crashes, and even identity theft. Security has become a significant concern that even the casual personal computer (PC) user can’t afford to overlook.
What are the threats?
In the “good” old days, viruses were the only real PC threats, and a computer could only become infected if someone opened an infected file, such as an email attachment. These days, viruses seem tame by comparison to the many other forms of internet sneak attack. Spyware, malware, adware, spam, intrusions, phishing, trojans, and worms are just some of a constantly expanding list of threat types that can compromise your PC without you doing anything more than searching the web or reading your email. Some are fairly benign, perhaps only trying to sell you something or track your travels on the internet. Others can be aggressively malicious, gaining control of your system for the purposes of sending out phishing scams remotely or acquiring private financial information. At their worst, internet security breaches can result in identity theft and an unusable computer.
How likely am I to become a victim?
Anyone who goes out to the internet these days is probably more likely to be the target of a security threat than they are aware. Many types of malicious routines can get launched in your system by simply clicking on a link that looks like it should close the open window. Ironically, trusting soles who believe what they read can be fooled into launching spyware when they think they are clicking on a link that supposedly would protect their system from spyware. But how likely you are to get into trouble depends on how you connect to the internet, which version of Windows you are using, and what form of internet security you have. For example: PC’s with the first version of Windows XP and cable or DSL internet connections that do not have any form of internet security software are much more likely to become infected than those using XP Service Pack 2 and the full “Security” version of AOL 9 on a dialup connection.
What if I suspect my system is infected already?
If your system has become noticeably slower, brings up strange web pages and pop-up windows by itself, and is beginning to experience more crashes and error messages, it may already be compromised by spyware or some other form of internet threat. You could try to install antivirus and spyware scanning tools that can clear the offenders from your hard drive. Any of the name-brand internet security programs (Norton, McAfee, Trend Micro) have the capability of scanning your hard drive for resident threats. They can be purchased from most any computer or office supply store. They can also be downloaded from a variety of web sites, but these programs can be rather large so downloading and installing can take a significant amount of time depending on the type of internet connection. There are also good spyware scanning tools that can be downloaded for free. Unfortunately, after a PC gets infected, it may even experience difficulties downloading, installing, and running any internet security program. In the worst case scenarios, the Windows operating system can become corrupted to the degree that the only alternative is to completely clean off the hard drive and reload everything. This is not really as drastic as it sounds, but can be complex enough that it should only be attempted by those with a more advanced understanding of personal computers. Facing that kind of situation, the best thing a PC owner can do is contact a computer support specialist.
How can I protect my PC?
This is the most important question. The answer depends on the specifics of your computer’s hardware, operating system, and internet connection. Someone with a Windows ME machine, and a dial-up connection to AOL, running the “Security” version of AOL 9, would have a completely different set of security recommendations than someone on an XP computer with a cable internet connection. In general, computer users want to go with the most robust internet security package possible. What this means depends on the specifics of the system. For example, an old Windows 98 machine with only 64 megabytes of RAM will not be able to run a complete internet security software program, no matter how much is deleted from the hard drive. Some computer users have realized that the only way they can run a full internet security package is by first upgrading their computer’s random access memory (RAM) or even replacing their old computer with a new one. A good comprehensive internet security software package would have all the tools to guard your system, including a firewall, virus and spyware protection, pop-up blocker and spam filter. There are three recommendable internet security software suites that are available through most any computer or office supply store: Norton Internet Security, McAfee’s Internet Security Suite, and Trend Micro’s PC-Cillin. There are other brands of internet security programs out there that may also be as effective as these, but they don’t have enough of a track record yet to be recommendable. The down side to these software packages is that they can be complex and confusing to properly install, configure and run. For best results, consult with a technical support specialist. Spending a little money to have someone who knows what they are doing set up your internet security could save you a world of grief and expense down the road.
Internet Security Rules of Thumb
Here is a list of basic internet security practices that everyone should bear in mind.
– Don’t open a file attached to an e-mail unless you are expecting it or know what it contains.
– Whenever possible, delete spam email messages without opening them.
– Don’t click on links included with unsolicited e-mails.
– Never forward “virus alert” e-mails. It may be a hoax and could be used to spread a virus.
– Don’t reply to unsolicited e-mails requesting personal information.
– Don’t complete forms sent in the body of an unsolicited e-mail.
– Don’t click anywhere inside a web pop-up window. The safest way to close a window that is open in front of any others is by holding down the “Alt” key on your keyboard and then hitting “F4”.
– When sending personal information on a web page, make sure you’re on a secure Web server. The Web address should be “https://” rather than just “http://” (no s).