How Viruses Enter Your Computer

How Viruses Enter Your Computer

Computer viruses can infect a personal computer or a computer network arranged within your business in many ways. Spyware, viruses and malicious programs are very common and can hinder your work by appearing in USB sticks or emails.

Here are some of the most common ways you can get your computer infected with computer viruses.

  • Make sure you download the software you need for yourself or your business from a reliable source and run it using the corresponding antivirus program [โปรแกรม แอนตี้ ไวรัส which is the term in Thai] and with the appropriate spyware. Read all the indications about the program you are installing and if necessary, you can check if the website is reliable using tools like WOT.
  • Opening email attachments, as a general rule, should not occur with those you do not expect to receive. Computers can become infected when users open email attachments that contain malicious codes. Even if the message is from a co-worker, friend or family member, be careful before opening a link or downloading an attachment you don’t expect.
  • Any hard drive or USB stick connected to a business computer can contain different types of viruses. It is a common tactic for hackers to gain access to a network through a series of codes present in a pen drive unit, and they are capable of infecting the entire system with a virus or a Trojan. It is very advisable to buy a virus scanner [ซื้อ โปรแกรม สแกน ไวรัส which is the term in Thai].
  • When you are visiting unknown links you run the risk of ending up on a website that could access your computer through malicious files or obtain all kinds of information about our system. Carefully open those chats, emails or SMS that are suspicious, be careful even with the URLs that seem legitimate and check all the information they refer to.
  • Executing the most recent updates should also be done reasonably, with special care, especially those associated with Microsoft Windows or security-oriented. Always keep up to date the operating system, programs and add-ons of your browser that may also be vulnerable
  • Pirated software contained in applications such as BitTorrent for the illegal exchange of music, movies or copyrighted software may be another risk to consider. Most times these files and programs contain viruses.