Every File Inspected, No Viruses Detected

by Eric Pudalov, Community Events Coordinator

Before I officially start…I questioned myself as to whether this applied to “community events,” but I believe it does. The title is a quote from song parody master “Weird Al” Yankovic, in his Puff Daddy parody “It’s All About the Pentiums.”

We at GCSS regularly check our business e-mails, and as you all know, frequently receive attachments related to events or employee surveys.

As I’ve unfortunately learned partially through negative experience, opening attachments from unknown senders is an almost surefire way to receive viruses and spyware.

I once opened an e-mail that was from someone I supposedly knew, which had a file attached. The file turned out to be a virus; luckily, my anti-virus program at the time caught it. I also had a major virus problem on an old computer, because I downloaded a “song” from the file-sharing network LimeWire that turned out not to be a song at all.

In that case, I was able to solve the problem myself, but other times, I haven’t been so lucky. As far as our experience at the office goes, it’s best not to open files from unknown senders. Also, as Kevin from IT has shown several of us today, keeping our virus software updated is extremely important as well.

It seems that companies, even nonprofit organizations, can be especially vulnerable to this type of malicious software, because of our being connected over a network. If I happen to gain any other valuable knowledge in regards to this problem, I’d be happy to share it here.

In the meantime, let’s hope most of our e-mails are benevolent, rather than harmful.

For more information on network security and privacy, check out Network Security Blog.

Advertisements

About gcsscommunity

My name is Eric Pudalov, and I work as Community Events Coordinator with Georgia Community Support and Solutions, whose mission is to provide creative, life-enriching solutions to people with developmental disabilities and their families. I became interested in this field, however, due to having a disability myself; namely, I had brain surgery in 1996 at age 14, to remove a benign tumor. Following this, I had many difficulties with short-term memory, loss of strength, confusion, and emotional control. Fortunately, at present, I've recovered much of what I'd lost. Despite some setbacks, I graduated high school with honors, and received an academic scholarship to Adelphi Univ., where I earned a BA in Communications. Since then, I've held a number of different jobs and internships, among them a TA position at Sylvan Learning Center, and work as a "Service Leader" with Hands on Atlanta. Since living in GA, I've also been involved with two programs (including GCSS) that serve people with disabilities. My experience has included sharing apartments with adults with autism and other disorders. Though my so-called "limitations" may differ from those of others in the program, these experiences have helped me to realize that people, overall, are capable of much more than we may at first perceive. Search Engine Submission - AddMe
This entry was posted in Blogging, Business, Computer Security, Nonprofit, Technology and tagged , , , , . Bookmark the permalink.

3 Responses to Every File Inspected, No Viruses Detected

  1. Keeping anti-malware software up-to-date is very important, but also keep in mind that hackers test and modify their malware so that it isn’t detectable by anti-malware software. Anti-malware software relies very heavily on “signatures” to identify known malicous code. If there is no matching signature, there is a good chance that the anti-malware software will not perceive something as a threat.

    • Thanks for your insightful comment…I’ll write a follow-up blog entry in response. Unfortunately, we’re still learning some of this as we go, which makes us especially vulnerable.

  2. Pingback: Mal-Contention « GCSS: Community Events

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s