Russ Harvey Consulting - Computer and Internet Services

Security Strategies

Avoid Security Pitfalls | Prepare For Recovery | Use Email Wisely

Strategies to prevent infection from viruses, spyware and other on-line threats

Security Needs Have Changed

At one time virus threats were simpler and the software necessary to detect and eliminate them was too.

Today's Computers Face Greater Threats

Today's computers face much more dangerous threats coming from multiple sources at the same time.

Some security software is better than others at finding and quarantining infections, but no single product can detect everything that's out there, especially when it changes by the minute — not by the day, by the minute!Windows Secrets

Multifaceted Attacks

More recently, these attacks have become multifaceted (blended) threats requiring more than one form of security software. A blended threat can expose you even on websites you'd think were safe because many bring together information from many external sources — all potential avenues of vulnerability.

All it takes for a website to become vulnerable is for the owners to use a weak password or older software such as an outdated WordPress installation or a plugin that is compromised.

Government & Corporate Spying

Governments are collecting more about you and your Internet activities, supposedly to protect us all from terrorism. I'd describe this extreme collection of personal data as creepy rather than protective.

Some of these appear to be designed as instruments of Cyber warfare designed by nations and corporations — the only ones with the resources needed to develop these sophisticated programs.

For example, FinSpy (PDF–415 KB) was developed to monitor Mobile and Security-Aware Targets that regularly change location, use encrypted and anonymous communication channels and reside in foreign countries.

Zero-day Exploits

Zero-day exploits are those that take advantage of weaknesses in software that have either not been patched by the vendor. Often the vendor is unaware of the vulnerability, but hackers and government agencies like the NSA have stockpiled these to attack the computers and phones of their victims.

These vulnerabilities can be exploited immediately (hence “zero-day”). There is also a strong black market for zero-day exploits and not only for hackers.

Many companies have abused the intent of the U.S. DMCA to prevent researchers and pro-privacy organizations from seeking out these vulnerabilities with the misguided belief that everyone is safer because no one knows about them. More likely they don't want to spend the resources patching zero day exploits.

Frequent updates of Adobe Flash and other software are an attempt to patch these exploits.

Spying or Keeping Us All Safe?

Police and agencies like the CIA and NSA use these to spy on their citizens and other countries. There has been a call for zero day exploits to be identified so weaknesses can be patched.

In 2014, it took software companies an average of 59 days to create and roll out patches for zero-days — up from only four days in 2013. — Symantec

The pressure on the American tech companies to work with these secretive government agencies is very strong and may account for some of the long-term vulnerabilities in software and hardware. It is the same thinking that demands back doors to encryption software as though only legitimate users (government) could exploit such weaknesses.

Fake Security Warnings

Watch for fake security warnings.

These are sudden warnings about dozens or hundreds of infected files. The alert is designed to upset you and get you to either install something dangerous or to pay for software that you neither need nor can help you.

Many Infected Files Unlikely

That many infected files is unlikely unless you have been running without current security protection for some time.

Instead of panicking, run a full security scan using a product from valid antivirus vendors. If you're unsure, contact a reputable local service company such as Russ Harvey Consulting.

Know Your Security Software

Knowing how your security software actually warns you of threats is critical if you want to avoid these nasty infections. You DON'T want to provide them with your credit card any more than you would a street-corner hoodlum.

Phishing Attempts

Never follow links or provide login information to sites linked in an email — especially those threatening to close your account and requesting your user name and password. This is called phishing.

Instead, type an address you've sourced from an invoice or other document provided by that company directly into your browser to visit the real site then report the phishing attempt to your financial institution then delete the message and its attachments unopened.

The same goes for unrequested phone call that require you to provide personal information to confirm they're talking to the right person. Remember, they called you (caller ID can be faked) so it is their identity that is unconfirmed.

Ask who is calling, then call the caller back using a phone number obtained from a recent invoice or statement from that company. Don't be surprised if they don't know what you're talking about.

These are attempts at identity theft and are designed to defraud you.

Prevent the Spread of Infections

There are several things you can do to prevent the spread of viruses, spyware and other infections to your computer:

Look for more detailed information in the following sections.

Return to top

Avoid Security Pitfalls

One of the significant issues with security is the aspect of social engineering. Too often it is the computer operator that makes a bad decision that can lead to a security breach.

Avoid Contamination From External Sources

Always run a security scan on re-writable media (USB drives, CDRW, floppy disks etc.) that have been used on someone else's machine.

  • Run a full scan on the drive to ensure it is free of problems that may have been inherited from the other computer(s).
  • DON'T trust a “free” CD that comes in the mail unless you can verify its source and purpose.

Physical Security

Anyone with physical access to your computer can threaten its security.

  • Do not allow unauthorized access to your computer. This includes well-meaning friends or relatives who may be more knowledgeable than you about computers, but may add software that increases your vulnerability.
  • Have clearly defined rules about computer usage for your children. Limited-access accounts are recommended (Windows installs accounts with administrator privileges unless you specify a limited account).
  • Be sure to have your computer serviced by a trusted technician or service. You may wish to remove or password-protect sensitive material first.

“Virtual” Security

Because most computers today are continually connected to the Internet, you need to be careful to protect your data and the security of your computer.

  • Use a software firewall like ZoneAlarm which, when configured properly, will stop Internet access to malicious programs — provided you don't automatically give permission for every program requesting such access.
  • A hardware firewall (router) will not stop outbound activity.
  • Use strong passwords that include a variety of characters (mixed-case letters and number and character, where permitted) rather than a recognizable word.
  • Passwords should be varied and changed regularly. If you can easily say your password, you're probably vulnerable.
  • Use a password manager, not your browser's password built-in utility, to remember passwords. LastPass is recommended.

Download Safely

When downloading software, take precautions to avoid infecting your computer.

  • Download files into a standard directory (the Downloads folder is recommended) then scan the folder for viruses and malware before you use them.
  • Some sites want you to install their “downloader” software. Don't. This obscures what is being downloaded and can add unwanted or exploitive software to your system.
  • Many programs download to the desktop so that uneducated folks know where to find the files. Configure these downloads to go to the Downloads folder.
  • I strongly recommend that you never install file-sharing programs such as “LimeWire.” These programs open your computer to downloads from unknown sources — often pirated or otherwise tampered with.
  • Do not use pirated software. Use only legitimate software from a trusted source.

Ensure you are downloading what you think you are.

  • Watch for misleading “download” buttons that are designed to make money for the site rather than simply provide you with the software you asked for.
  • Check a file for digital signatures. Right-click the file and select Properties. The Digital Signatures tab should provide the identity. Also check the Details tab for information. If neither of these provide information about what the file is and who created it, how will you know what it is 6 months from now?
  • If the program's name doesn't clearly indicate what it is for, place it into a folder that describes it adequately so you know what it is. You might want to rethink installing such software.

Turn Off and Remove Unneeded Services

Many services installed are not necessary for the average user but provides additional vulnerable points for infection, especially from blended threats.

  • Most users do not need server capability or telnet.
  • If uninstalled, you do not need to maintain the patches for vulnerabilities for these services.
  • Removal may also help your computer run faster since these services utilize system memory (RAM).

One example is Bluetooth, a wireless communication protocol. While useful in connecting devices it can also be used to attack your system.

Turn Off AutoRun

AutoRun is a convenient method of automatically launching programs when a CD or USB drive, etc. is inserted. However, this can be used by malicious programs to infect your computer.

Be Aware of Weaknesses Within Your Software

Weaknesses exist in ALL operating systems (Windows, Macintosh and Linux) as well in the software that runs on them (browsers, email clients, word processors, etc.).

Update Windows and other software to close known security vulnerabilities that can be patched.

It is unfortunate that Microsoft chose to use malware tactics to move people to Windows 10. They also provided unhelpful descriptions of available updates so people would install the telemetry updates that many Windows 7 and 8 users were trying to avoid by not accepting the free update to Windows 10. As a result, many folks stopped updating Windows altogether.

Other Software

All software should be patched where updates are available. However, office, browser plugins and Internet programs are the most vulnerable.

Run only currently supported software. Once support expires you should seek out a currently supported and suitable alternative then uninstall the vulnerable (unsupported) program(s) once you've transferred any personal settings or data.

  • You should be running the latest version of your web browser available to your operating system (usually free). Don't use Internet Explorer, but it should be the most recent version available for your version of Windows.
  • Similarly, watch for vulnerabilities in email clients.
  • Office software needs to be current as well. If your office software is no longer updated, LibreOffice provides most of the features of Microsoft Office and it is free.
  • Many plugins such as Java as well as PDF viewers like Adobe Reader add special vulnerabilities because they are universally installed across multiple operating systems.

I strongly recommend uninstalling software you haven't used in a while. This avoids issues with security flaws and potential problems with software that is no longer useful to you. In most cases you can reinstall the current version if you need it in the future.

Windows More Vulnerable

Windows is more vulnerable to infections because it is poorly designed from a security perspective.

  • It is widely distributed and the sophistication of the average user is not very high (Microsoft made Windows to be "easy" rather than secure).
  • Why bother writing a virus for a rarely-used operating system where the knowledge level of the average user is more sophisticated?

That said, Mac computers have become more popular (just have a look in any coffee shop). Macs are now a target so Mac users need to install security software.

Windows Update

Windows Update is Microsoft's method of updating Windows and other Microsoft software.

  • Critical Updates make your computer less vulnerable to viruses and other attacks.
  • Ensure that Windows Updates is set to automatic.
  • It is a good idea to check manually for Windows Updates from time-to-time as this will allow you to view additional non-critical updates and ensure that automatic updates are being installed correctly.
  • Always install service packs. If you have issues with installing Vista Service Packs on Vista Basic computers with low resources do what you can to increase the resources (usually by investing the needed RAM upgrades).
  • You need to be running a major Windows 10 spring or fall update no older than one year old to remain supported.

Don't Run Obsolete Software

Krebs's 3 basic rules for online safety:
  1. If you didn't go looking for it, don't install it.
  2. If you installed, update it.
  3. If you no longer need it, get rid of it!

Running older Windows versions makes you more vulnerable. Microsoft has ceased sales of all versions of Windows prior to Windows 10.

  • Windows 7 is more secure and will often run on more recent Windows XP or Vista machines. It is the last version of Windows where content is fully contained on your own computer. However, it will soon be unsupported (January 14, 2020).
  • Windows 8.1 takes advantage of modern hardware security (UEFI) but also requires logging in using your Microsoft ID (an online connection) in order to take full advantage of its features. This makes it more vulnerable.
  • Windows 10 can run on more hardware than ever before, but is different than any Windows previously. Microsoft claims it is the safest Windows ever, but it is Software as a Service and there are privacy concerns. Even searches for local content are sent to Bing.

If you're running a version of Windows older than those listed above you should immediately move to replace them with a newer version or current version of an alternative operating system like Linux or Mac.

Return to top

Prepare For Recovery

  • Maintain regular backups of your computer, especially critical data. It is better to be over-prepared than regret your laxness later. This is the only recovery option for ransomware other than paying the ransom (and hoping they honour their end of the deal).
  • Keep current copies of key system files and critical documents on a flash drive or other removable media.
  • Follow a regular backup strategy.
  • Store copies of critical files off-site. A fire or other disaster could destroy your on-site backups as well as your computer.
  • Backups stored online (in the cloud) could be vulnerable to ransomware attacks.

Return to top

Use Email Wisely

Do Not Forward Everything

Today it is too easy to forward information to everyone at the touch of a button.

Take a moment and decide if you'd forward the item if you had to retype it or photocopy it, then pay to snail-mail it to all the folks you're about to send it to. In most cases this isn't true.

If you've had to change your email address because of the amount of junk you're receiving, you're probably guilty of forwarding it to everyone else.

Use an "Opt-In" Approach When Forwarding Mail

Be kind and don't assume that everyone wants to get the cute jokes and other material that floods your mailbox.

  • Many people have significant amounts of legitimate email to deal with and such messages are usually NOT welcome.
  • Ask people before placing them on your list. This is known as opt-in (as opposed to the opt-out that spammers favour).

Do Not Report “Infected” Messages to the "Sender"

Please don't waste Internet bandwidth telling a person that they have sent an infected message.

  • Virtually all infected messages (as well as spam) have forged headers (false address information).
  • The "sender" listed in the message is almost certainly not the one that transmitted the message.
  • Both statements can be verified using the information found in the message's full headers

Don't Click on Weird Links

If you receive a message with no text in the body except a weird-looking link, the sender's account has been hijacked. Don't click on the link.

  • These usually come from webmail accounts rather than computer-based email clients.
  • In most cases their account has been compromised because they used a weak password.
  • A phone call may be a better option (with a suggestion that they view the resources on this site).

Beware of Unexpected Attachments

If you receive a message with an unexpected attachment, don't open the attachment.

Use BCC:

Use BCC: (blind carbon copy) when sending messages to groups rather than revealing a list of related addresses to everyone the message goes to.

  • Many email programs harvest all the incoming addresses into their email address book.
  • Many virus worms automatically spread by sending infected emails to everyone through the address book listings (without warning the infected computer's owner).
  • You have no control of the message once it is sent. Forwarding a quoted message with all the original addresses intact is an invitation to spam and is a disservice to your friends.

Return to top

Avoid Social Engineering

Rein in Your Curiosity

Social engineering can be used to increase our vulnerability to spreading viruses. The human element of curiosity is a significant risk factor — one that no security program is going to protect you from.

One example, the ILoveYou virus, exploited the human desire to be loved to get people to open an infected message.

  • Know your security software and how it responds. Fake “security” software depends upon your ignorance.
  • Hoaxes are just one form of deception that takes advantage of this trait.
  • Choose from known brand-name security vendors and only download from trusted sites.
  • Do not respond to pop-up warnings about infections on websites you visit. Most are scams that will likely infect your computer and leave with a false sense of security.

Social Media

Avoid embarrassment (or worse, a security breach). Be careful about how much information you provide. Facebook is NOT your friend.

  • Many outgoing links on Facebook are obfuscated (disguised) so you don't know what you're opening.
  • Facebook links are often designed to capture your morbid curiosity that lead to unsafe locations.
  • This is great for advertisers but a disaster from a security point of view.
I only use Facebook to keep in touch with family and friends.

Were that true of the majority of Facebook users, elections could not be tampered with and fake news would die in its tracks.

Checking Out New Software?

Before downloading and installing new software or responding to an unexpected warning, search for information on the Web.

Your search results for a particular piece of software or warning should give you more information than you need to make an informed decision.

  • Problematic software generally shows up in such a search. (How to make an effective search.)
  • Avoid the first few offered search results as these are generally “sponsored” results (ads) and probably won't provide you with useful results.
  • Search results should give you more than you need to make an informed decision.
  • In the case of risky software, you DON'T want to be the first kid on your block to try it.

Free or “Found” Media

“Free” external media is another form of social engineering. Everybody likes free stuff. But that “free” item may end up costing your or your employer a great deal.

  • Placing a DVD or thumb drive that arrived in the mail may be all it takes for your system to be compromised.
  • Scattering a few infected thumb drives in an employee parking lot is one method of gaining access to a secure location.

It only takes one person to place the media into their computer and the whole network can be infected.

Return to top

Related Resources

Related resources on this site:

or check the resources index.

Return to top

If these pages helped you,
buy me a coffee!
Updated: October 29, 2019