Part 2: How To Protect Yourself From Malware
If you hate spam and phishing then this article is for you. No, we are not talking about artificial meat or putting bait on hooks. Spam and Phishing are common tactics hackers will use to harm your device.
As we discussed in our previous topic, malware is ever changing and the first step to a good defense against malware is to always remain suspicious of emails and text messages. Hackers and cyber criminals are very clever in how they send emails, text messages and manipulate internet popups. So the ever important question now becomes, what practical steps can I take to protect myself and my devices?
Spam or Phishing
What is the difference? Both may come to your inbox without your consent. There is a big difference between the two and its worth knowing for your protection.
Spam emails are typically sent from companies for marketing. Maybe they wanted to let you know of the current sales or upcoming events. It is certainly annoying but not necessarily hazardous. Spam emails typically will not ask for you to click on links or enter your personal information.
Phishing emails are cleverly designed to make you enter some of your information or will ask you to visit a certain site. These are the most important to be wary of but keeping a close eye on all emails is recommended.
Do Not Get Complacent
The best defense is to always remain suspicious when you get an email or text message from someone you do not know. That is easy to spot. If you see an email address that looks way too suspicious, it probably is.
However, did you know that some cyber criminals might watch your internet habits and form an identity of who you are and who you interact with? For example, a cyber-criminal may watch your internet habits and see that you regularly email your parents, that you are interested in animals or that you just bought a brand new car. A cyber-criminal may use this data about you to launch a “spear phishing” attack against you!
A “spear phishing” attack may look like a regular email from someone you trust but with very minor differences. Imagine your parents email is “myparents@gmail.com”. A “spear phishing” email may look like “myparents@gmal.com”. Did you spot the difference? A little letter “i” was missing from the address. It can be easy to miss and when you are at work or in a hurry you may not concentrate close enough to spot the difference!
A malicious sender could make their name the same as someone you trust. Therefore, be sure to verify the email address of the sender. But do not click on their email address. Simply hover your mouse over their name and it will show the email address.
Computers are not the only device susceptible to these attacks. All devices from phones, tablets, laptops and computers can be jeopardized.
The point is, do not get complacent and just click emails that seem to be from legitimate senders. But that is not all.
Do Not Click Links
If you have identified that the sender is different from someone you trust then the next step is to not click any links provided in the email.
Hackers will try and get you to click links included in emails or text messages. Normally we all would see a suspicious email and delete it. Hackers also know this. To counteract our natural suspicions hackers will try to prey on your emotions. “Your account has been suspended” or “the police have been notified unless you act now” or “your family member wants to send you money.” When our emotions get involved in the email we could accidentally let our guard down and possibly click the links.
Additionally, never download email attachments from suspicious senders or download items from the internet that cannot be verified. These files may contain malware just waiting to be unleashed upon your devices.
Protect Your Identity
Ask yourself important questions:
1. Who is asking for this information?
2. What information are they asking for?
3. Why are they asking for this information?
4. Where is this website?
5. Is it a secured and verified site?
If after asking yourself these questions you still feel nervous, trust your gut and get additional information. Contact Jellie Tech if you have a suspicious email or questions on your digital safety.
Program Protection
Regardless of the device you are using look into getting some antivirus or antimalware programs. These will help keep your device protected and alert you to potential risks. Need help finding a good program? Contact Jellie Tech for recommendations.
Be Cautious About Restarting Your Computer
If you have downloaded infected data you may be prompted to turn off your device, have a good cry and hope things get fixed when you turn your device back on. Be cautious about turning your device off. If the data you downloaded infects your computer, turning it off may only make matters worse. The malware could contain code that locks you out of your system and the only way to get back in is to pay a “ransom.” This is called ransomware and it has infected many individuals and even large corporate operations.
VPN
When using free public wifi be sure you use a VPN service. These will help keep your information safe and prevent hackers from targeting you via the unprotected and massively used hotspot. Most VPN services will charge you to use their service but they are worth the investment when connecting to public wifi. Even on trusted networks it’s a nice service to have to extend your protection.
What If I Have Malware?
If you find that your device is not working right or you have additional questions on how to keep safe in the digital world contact Jellie Tech. Our team will be glad to give you the personal assistance you need! Fill out a request via the Contact Us or Help Desk pages.

