Tek Tip - All emails are guilty until otherwise proven innocent - The Tek > Blogs
X

Blogs

11Sep

Tek Tip - All emails are guilty until otherwise proven innocent

Tips | 0 Comments | | Return |

One of the easiest ways to get a virus is by opening an attachment that you weren't expecting.  Most of my customers stories start with "so I got this email and it came from me to me, so I got curious and opened the attachment."  OR "ups sent me a message about a package I never sent and said it couldn't be delivered so I opened the attachment per the instructions and now my files are gone".
 

The general rule of thumb in today's email world is if it looks even a little bit odd or you get an email you weren't expecting with a questionable attachment don't open it!  The minute you download an attachment it is on your computer and can execute code to cause harm.  Make sure you use an email provider with good spam and virus protection and make sure you have an up to date virus and malware protection program.
 

Again if it looks fishy don't mess with it!  Always error on the side of caution.
 

If you think you got a virus or malware on your computer give us a call today!

Related

7 Quick Cyber Security Tips for SMB Business Owners

From Fortune 500 companies to SMBs, everyone knows that technology changes constantly. Depending on ...

Read More >

Cool Micro PC setup for Conference Room

We had a client that needed a conference room TV that was fast and portable. This was our solution.

Read More >

Tek Tip - Illustrator Tool Arrow dropdown not working

In the latest update of  Adobe Illustrator CC 2015 the arrow which opens up the drop-down menu ...

Read More >

Hurricane Florence - Be prepared

Hurricane Florence has come and gone but the aftermath for many in its path will go on for months, e...

Read More >

What Do Small Businesses Need to Be Thinking about in 2018?

For "Small & Medium-sized Business (SMBs)". - "A fairly inexperienced hacker can a...

Read More >

Why SMBs Need to Get Wise to the New Threat Landscape

The cybersecurity landscape changes every day, with new actors, new threats, new schemes, and new wa...

Read More >
You need to login in order to comment
Sign up for our Newsletter
Name