Posts Tagged ‘User’

Spyware and Malware Misconception #3

Tuesday, April 13th, 2010

If my computer is working fine right now, I don’t need to perform maintenance on it.

This is probably one of the biggest and most deadly misconceptions that most computer users fall victim to. Computers are just like cars. If you don’t change the oil, change the filter, rotate the tires, flush the transmission, and perform other regular maintenance on your car, it will eventually break down and cost you FAR MORE to repair than the cost of the basic maintenance.

There are certain maintenance checks that need to be done daily (like virus updates and spam filtering), weekly (like system backups and a spyware sweep), and monthly or quarterly like checking for and installing security patches and updates, disk defrag, spyware detection and removal, checking the surge suppressor and the integrity of the hard drive, and so on.

Your computer repair technician should be adamant that you have regular maintenance done on your computer and should offer to set up automatic virus definition updates, spam filtering (to avoid viruses), and automatic system backups that are stored on an OFF SITE location (this protects the backup from fire, flood, or other natural disasters).

Lack of system maintenance is the NUMBER ONE reason most people end up losing valuable files and incurring heavy computer repair bills.

Reblog this post [with Zemanta]

“Stupid Company” Procedures

Monday, March 29th, 2010

Part of my job at HITman Services is researching software at our Clifton Park office.

Over the weekend I was trying out some new BlackBerry apps.  One which I thought was very interesting was Visible Vote.  I signed up for an account and started using the application.

Shortly thereafter I received an email from the company with my user name and password in the email.  I was under the impression that the practice of sending passwords in emails ended years ago, but obviously I was wrong.

When I sign up with companies I am not familiar with or whose security procedures I am unsure of, I use a throw-away password.  Which in this case turned out to be the right thing to do.

I sent the company an email regarding their antiquated security methods, and have yet to hear back.

Reblog this post [with Zemanta]