Electronic mail is one of the most important ways in which viruses are transmitted, as it does not guarantee the origin, which involves certain inherent risks such as possible access by others to the content of the mail, the supplanting of the sender or the sending of viruses. To use it with minimum risks, it is recommendable:
- Not to execute attached files directly, it is much safer to previously extract them to a computer directory.
- In the event of receiving unwanted mail, it is recommendable to contact the sender to confirm the mail, or delete the message directly. It must never be opened even if it comes from a known sender.
- Do not take part in chain mails. There are a large number of mails which contain virus hoaxes. Legitimate commercial companies and alert centres generally redirect to web servers where they reliably give information and details of the action to be taken. Mails must not be resent indiscriminately.
- Activate the text mode in the mail client. (For expert users)
- Cipher sensitive information. (For expert users)
One of the important subjects in considering that we are browsing securely is the protection of our data, whether they be personal, contact, financial or any other kind. It is therefore recommended:
- To maintain anonymity with regard to the personal and professional data on website data request forms. To provide real data only when this is essential for obtaining a service (for example: when a purchase is made or when a postal mailing has to be received).
- To enter financial data only on secure websites.
If your system of keys corresponds to a card of coordinates, never trust their all being requested on the same form. This second authorisation key is only necessary for authorising operations.
- Do not use the same passwords in high security and low security systems.
- Do not give personal details in websites that fail to guarantee compliance with current legislation (LOPD) and/or do not have a secure website (SSL).
- Use alias mail accounts (instead of the original) to access certain services that require the introduction of an existing electronic mail address. (For expert users)
- When using public computers or computers shared with others, ensure that the basic protections are in place: disconnection of sessions, deletion of cache memory...
- Take particular care when giving sensitive information to persons requesting who are not authorised or whose identity can not be checked irrevocably.
There are many advantages to browsing on internet, but it is important to have the computer well protected. Depending on the importance of the information it contains, we must apply certain security measures.
- Do not keep anything confidential in shared directories of P2P programmes such as eMule, eDonkey, etc...
- Always turn off the computer when it is not being used.
- Take special care in systems with fixed IPs (ADSL).
- Install personal firewall software, preferably with an intruder detection system. (For expert users)
- Do not share disks or printers on internet, and especially directories shared with P2P programmes.
One of the elements that protects our computer from possible intrusions is the password. It is highly advisable to use it and ensure that nobody knows it who should not have access. For it to be really effective, certain recommendations must be borne in mind:
- Do not write passwords on paper or in documents on the computer.
- Change the password periodically.
- Choose passwords that are difficult to deduce, avoiding their coinciding, for instance, with one's date of birth or telephone number.
- Do not use the same keys for dangerous or unknown websites as for high security entities.