Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Victim? In many cases add the word "willing." The media's point of view and how they choose to portray these occurrences always makes me chuckle.
In the past decade, there has been very little progress when it comes to onliners wanting to acquire just enough information and knowledge to know how to protect themselves. They throw their hands up claiming "I'm not a techie!" while they proceed to want to participate in "technienology." The truth is these issues are part and parcel of participation.
Many do not update their virus programs (that is if they even have one in the first place) and they believe some of the most gratuitously ridiculous offers. That is as long as those "offers" insinuate easy riches with little effort or expense. To that end; there is your weakest link. The propensity to believe misinformation that caters to one's inner desires.
When did plain old common sense go out the window? Why do the natural rules of trust, common sense and due diligence for some reason not seem to apply online? Off-line if these tactics were used, most would probably laugh the salesperson right out of the building! But online, we enter the surreal world of possibilities combined with the perception that some of the most important issues of all are ours to ignore or disregard if we so please.
When it comes to impeding scams and viruses there are three simple solutions:
1. For Scams: Simply don't believe it; none of it! If it comes in an e-mail you didn't request-just hit delete! If it's on a Web site, do your due diligence to confirm claims and to ask for recommendations and proof. Investigate how long the site has been online. Read their terms and conditions. E-mail them with every single question you may have before you give them one red cent of your hard earned dollars. Only proceed if you receive timely and concise answers. Not willing to make these efforts? Then plan on getting ripped off and you deserve it! Buyer beware? More like buyer be informed!
2. For Viruses: Update your virus software every time you log on. Simple. Don't click on any links within e-mails that you are not expecting. Most virus software has an automatic scheduler so that the software can update daily at specified times. Once this is setup you will no longer have to manually update. Then, keep your update subscription current. Remember, you computer doesn't know what to protect you from without these updates!
3. Make an effort in both these areas to understand the tools and resources available to you to help you participate in a smart and informed manner. You can literally check anything out online by searching Google to find reviews, warnings or even accolades and recommendations. Take the time to use and absorb the information available to you if you want to participate in information technology!
By following the above three steps, those who create viruses wouldn't have a leg to stand on and the scammers would not be in business by taking advantage of what folks don't want to take the time to understand or verify.
As long as Netizens do not make a concerned effort to be informed there will be someone out there willing to take advantage of them. Don't blame technology; don't blame the scammers and hackers. The blame should be placed with those who can easily avoid these situations, but choose to not be informed enough to do so.
About the Author:
Judith Kallos is an authoritative and good-humored Technology Muse who has played @ http://www.TheIStudio.com for over a decade.
Check out her popular Technology Cheat Sheets: http://www.LearnAndThrive.com
Scams involving email continue to plague consumers across America, indeed... Read More
Since its birth, the Internet has grown and expanded to... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
A little bit of time invested into learning about internet... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
As more people are logging onto the Internet everyday, Network... Read More
It has been said that with the wealth of information,... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Much has been said on the theory of password protection... Read More
Spyware is software that runs on a personal computer without... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
If you are a parent, you have probably wondered at... Read More
The 1998 Data Protection Act was not an extension to,... Read More
You may not realize it, but as you are surfing... Read More
Did you know...? 1 in 5 children who use computer... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
If you use emails actively in your communication, you must... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Well, this is an article I never thought I would... Read More
Computer infections can be broken up into 4 main categories... Read More
Well, if that would have been said to me by... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
You may not realize it, but as you are surfing... Read More
There is no doubt that "how-to articles" have become a... Read More
There are ways to insure security though. You can get... Read More
Spyware is the most troublesome software to appear on the... Read More
Identity theft is one of the most common criminal acts... Read More
A new variation of the Nigerian Scam theme ... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
You and I are a lot alike. We are both... Read More
Microsoft routinely releases new security updates, many of which are... Read More
A few nights ago I received an email from "2CO"... Read More
If you have used a Windows machine for a while,... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
During the release of a new software product specialized to... Read More
Watching how the traditional media covers the latest virus or... Read More
While clicking from site to site on the internet you... Read More
When it comes to a secure website and passwords it... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Have you ever bought a product or service from the... Read More
First the basic definition of Spyware: It is a type... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
|