<<

Protect Your from Viruses, , & Spies Tips for Consumers

Consumer Information Sheet 12 • January 2015

Today we use our to do so many things. We go online to search for information, shop, , do homework, play games, and stay in touch with family and friends. As a result, our com- puters contain a wealth of personal information about us. This may include banking and other financial records, and medical information – information that we want to protect. If your computer is not protected, identity thieves and other fraudsters may be able to get access and steal your personal information. Spammers could use your computer as a “ drone” to send spam that looks like it came from you. Malicious viruses or could be deposited on your computer, slowing it down or destroying files.

By using safety measures and good practices to protect your home computer, you can protect your and your family. The following tips are offered to help you lower your while you’re online.

3 Install a 3 Use Anti-virus A firewall is a software program or piece of Anti-virus software protects your that blocks hackers from entering from viruses that can destroy your , slow and using your computer. Hackers search the down or crash your computer, or allow spammers the way some telemarketers automati- to send through your account. Anti-virus cally dial random phone numbers. They send protection scans your computer and your out pings (calls) to thousands of computers incoming email for viruses, and then deletes and wait for responses. Firewalls prevent your them. You must keep your anti-virus software computer from responding to these random updated to cope with the latest “bugs” circu- calls. A firewall blocks communications to and lating the Internet. Most anti-virus software from sources you don’t permit. This is especially includes a feature to download updates important if you have a high-speed Internet automatically when you are online. In addition, connection, like DSL or cable. make sure that the software is continually running and checking your system for viruses, Some operating systems have built-in firewalls especially if you are downloading files from the that may be shipped in the “off” mode. Be sure Web or checking your email. Set your anti-virus to turn your firewall on. To be effective, your software to check for viruses when you first firewall must be set up properly and updated turn on your computer. You should also give regularly. Check your online “Help” feature for your system a thorough scan at least twice a specific instructions. month.

1

Office of the Att orney General Privy ac Enf orcement and Pr otection Unit Ca lifornia Dep artment of Justice www.oag.ca.gov/privacy 3 Use Anti-spyware Software 3 Use a Strong – Spyware is software installed without your and Keep it to Yourself knowledge or that can monitor your Protect your computer from intruders by choos- online activities and collect personal information ing that are hard to guess. Use strong while you surf the Web. Some kinds of spyware, passwords with at least eight characters, a combi- called keyloggers, record everything you key in – nation of letters, numbers and special characters. including your passwords and financial informa- Don’t use a word that can easily be found in a tion. Signs that your computer may be infected dictionary. Some hackers use programs that can with spyware include a sudden flurry of pop-up try every word in the dictionary. Try using a phrase ads, being taken to Web sites you don’t want to to help you remember your password, using the go to, and generally slowed performance. first letter of each word in the phrase. For ex- ample, HmWc@wC2 – How much wood could Spyware protection is included in some anti- a woodchuck chuck. Protect your password the virus software programs. Check your anti- same way you would the key to your home. After virus software documentation for instructions all, it is a “key” to your personal information. on how to activate the spyware protection features. You can buy separate anti-spyware 3 Secure Your . software programs. Keep your anti-spyware If you use a wireless network in your home, be software updated and run it regularly. sure to take precautions to secure it against hackers. Encrypting wireless communications is To avoid spyware in the first place, download the first step. Choose a wireless router with an software only from sites you know and trust. feature and turn it on. WPA encryp- Piggybacking spyware can be an unseen cost of tion is considered stronger than WEP.1 Your many “free” programs. Don’t click on links in computer, router, and other equipment must pop-up windows or in spam email. use the same encryption. If your router enables identifier broadcasting, disable it. Note the SSID 3 Manage Your System and Browser name so you can connect your computers to the to Protect Your Privacy network manually.2 Hackers know the pre-set Hackers are constantly trying to find flaws or passwords of this kind of equipment. Be sure to holes in operating systems and browsers. To change the default identifier on your router and protect your computer and the information on the pre-set administrative password. Turn off it, put the settings in your system and your wireless network when you’re not using it. browser at medium or higher. Check the “Tool” or “Options” menus for how to do this. Update Remember that public “hot spots” may not be your system and browser regularly, taking secure. It’s safest to avoid accessing or sending advantage of automatic updating when it’s sensitive personal information over a public wire- available. Windows Update is a service offered less network. You may also consider buying by . It will download and install a mobile broadband card that will allow you to software updates to the connect to the Internet without relying on Wi-Fi , , Outlook hot spots. A mobile broadband card is a device Express, and will also deliver security updates that plugs into your computer, laptop, PDA, or cell to you. Patching can also be run automatically phone and uses a cell phone to provide high- for other systems, such as Macintosh Operating speed Internet access. They are sold by cell phone System. companies and require a monthly service plan.

2

Office of the Att orney General Privy ac Enf orcement and Pr otection Unit Ca lifornia Dep artment of Justice www.oag.ca.gov/privacy 3 Be Careful if You Share Files OnGuard Online Many consumers enjoy sharing digital files, such Practical tips from the federal government and as music, movies, photos, and software. File- the technology industry to help you be on sharing software that connects your computer guard against Internet , secure your com- to a network of computers is often available for puter, and protect your personal information, free. File-sharing can pose several . When at www.onguardonline.gov. connected to a file-sharing network, you may allow others to copy files you didn’t intend to Online Guide to Practical Privacy Tools share. You might download a virus or bit of spy- resources from the non- ware that makes your computer vulnerable to profit Electronic Privacy Information Center, hackers. You might also break the by down- available at www.epic.org/privacy/tools.html. loading material that is copyright protected. Product Reviews 3 Shop Safely Online The independent nonprofit Consumers Union provides product reviews and strategies in a When shopping online, check out the Web September 2008 article in ConsumerReports.org, site before entering your number or “Get the Most from Security Software,” available other personal information. Read the privacy for free online at www.consumerreports.org. policy and look for opportunities to opt out Product ratings are available to subscribers. of information sharing. (If there is no privacy policy posted, beware! Shop elsewhere.) Learn PC Magazine provides product reviews in an how to tell when a Web site is secure. Look October 2008 article, “The Best Security Suites for “” in the address bar or an unbroken for 2009,” available for free online at www. padlock icon at the bottom of the browser win- pcmag.com/article2/0,2817,2333448,00.asp. dow. These are signs that your information will be encrypted or scrambled, protecting it from PC Magazine provides reviews of hackers as it moves across the Internet. in a May 2008 article, “Free Security Software,” available for free online at www.pcmag.com/ 3 Parents, Take Control article2/0,1759,2304349,00.asp. Don’t let your children risk your family’s privacy. Make sure they know how to use the Internet safely. For younger children, install parental con- trol software that limits the Web sites kids can visit. But remember – no software can substitute for parental supervision.

3 Additional Information Consumer Information Sheet 6: How to Read a Privacy Policy Consumer Information Sheet 9: Protecting Your Child’s Privacy Online Consumer information from the California Department of Justice, available at www.oag. ca.gov/privacy.

3

Office of the Att orney General Privy ac Enf orcement and Pr otection Unit Ca lifornia Dep artment of Justice www.oag.ca.gov/privacy NOTES i WEP is Wired Equivalent Privacy, a security protocol that encrypts data sent to and from wireless devices in a network. WPA is Wi-Fi Protected Access: a security protocol developed to fix flaws in WEP. ii SSID is Service Set Identifier, the name a manufacturer assigns to a wireless network router. The same SSID may be assigned to all hardware of the same type.

This fact sheet is for informational purposes and should not be construed as legal advice or as policy of the State of California. If you want advice on a particular case, you should consult an attorney or other expert. The fact sheet may be copied, if (1) the meaning of the copied text is not changed or misrepresented, (2) credit is given to the California Department of Justice, and (3) all copies are distributed free of charge.

4

Office of the Att orney General Privy ac Enf orcement and Pr otection Unit Ca lifornia Dep artment of Justice www.oag.ca.gov/privacy