After May 1, the computer will perform 4 checks: Acquaintance emails are not safe.

Source: Internet
Author: User

The National Computer Virus emergency response center reminds users to be vigilant when performing network operations during the period of active viruses and Trojans during the May Day holiday. After a long vacation, all units should conduct a comprehensive inspection of the computer system to prevent viruses.

Anti-virus experts said that during the May Day holiday, computer users may frequently browse Web pages, chat online, online shopping, and other online activities. In Browser IE, users enter the Web site, the account name and password for logging on to the website, and computer users enter their own bank accounts and passwords during online transactions, they are all private information data that can be stolen by malicious attackers. Users must be vigilant when performing these network operations. Do not use unfamiliar computers to perform these operations easily to reduce unnecessary economic losses.

The National Computer Virus emergency response center recommends that key enterprises, public institutions, and individual users take the following measures after the holidays to defend against viruses.

1. perform a comprehensive inspection of computer systems, establish emergency mechanisms and solutions for network security and virus incidents, and assign special personnel to handle incidents. Ensure that network security and virus events can be handled in a timely and effective manner to minimize the loss caused by virus attacks.

2. After the holidays, all units should first perform a comprehensive system upgrade on the computer system, including system patch upgrade and various security products upgrade to prevent computer systems from being infiltrated by viruses and Trojans.

3. disable unnecessary services and ports. Disable ports that are not required to be opened and may pose a threat to system security or use corresponding tools for real-time monitoring to detect suspicious intrusions in a timely manner.

4. In case of suspicious emails, delete them immediately. Because the sender of many virus emails is disguised, users may see emails sent by familiar people, however, it cannot guarantee the security and reliability of emails.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.