Virus Basics


A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. Some viruses are harmless, others may damage data files, and some may destroy files. Viruses used to be spread when people shared floppy disks and other portable media; now viruses are primarily spread through email messages.

This document contains frequently asked questions about viruses and ways to avoid them and lessen their impact.

Using Wireless Technology Securely


In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great numbers. On-the-go laptop users often find free wireless connections in places like coffee shops and airports.

If you’re using wireless technology or considering making the move to wireless, you should know about the security threats you may encounter. This paper highlights those threats and explains what you need to know to use wireless safely, both in the home and in public.



Spyware is becoming more widespread as online attackers and traditional criminals use it as a tool for crimes against individuals, businesses, and governments. Spyware can lead to financial loss, as in identity theft and credit card fraud, and it can also reduce consumers’ confidence in online safety and their willingness to participate in modern electronic commerce.

This paper discusses how to help stop the spread of spyware by being alert to suspicious computer activity and learning safe computing practices.

Software License Agreements: Ignore at Your Own Risk


By now you’ve heard all about computer viruses, Trojan horses, worms, identity theft, and phishing scams, and you’re taking the necessary steps to secure your computer and privacy when using the internet. One boring little item, however, can undo your good work—if you’re not careful. That item is the end user license agreement (EULA) covering the software you use.

Securing Your Web Browser


This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited information technology (IT) support and broadband (cable modem, DSL) or dial-up connectivity. Although the information in this document may be applicable to users with formal IT support as well, organizational IT policies should supersede these recommendations.

Recognizing and Avoiding Email Scams


Email provides us a convenient and powerful communications tool. Unfortunately, it also provides scammers and other malicious individuals an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch operations to phishing schemes using a combination of email and bogus web sites to trick victims into divulging sensitive information.

This paper advises how to protect yourself from these scams by understanding what they are, what they look like, how they work, and what you can do to avoid them.

Governing for Enterprise Security


Governing for enterprise security means viewing adequate security as a non-negotiable requirement of being in business. If an organization’s management does not establish and reinforce the business need for effective enterprise security, the organization's desired state of security will not be articulated, achieved, or sustained.

Disposing of Devices Safely


Removing your information from an old computer, notebook, tablet, or other technology is harder than it seems. Systems are set up to protect us from losing information we need—when we delete a file, we can still get it back. Similarly, others who get your discarded computer or other device can get it back, too. You need to take extra steps to remove information from your computing devices before you discard them. Otherwise, you risk exposing your private information.

Subscribe to Securing Your Computer