The FBI's National Infrastructure Protection Center (www.nipc.gov) has released its "Seven Simple Computer Security Tips for Small Business and Home Computer Users" at http://www.nipc.gov/warnings/computertips.htm or see below.
Note especially the tip about not opening attachments to emails -- even from friends -- without verifying that the sender actually meant to send it. The worst viruses now randomly select documents on an infected computer and email them to all the addresses they can find. In just the past two months I have gotten more than 10 infected attachments from persons who had my email address and allowed their computer to become infected. If you have questions about how to implement any of the tips, contact Marvin or me. Bob Gaines ******* Seven Simple Computer Security Tips for Small Business and Home Computer Users Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all accounts. Make regular backups of critical data. Backups must be made at least once each day. Larger organizations should perform a full backup weekly and incremental backups every day. At least once a month the backup media should be verified. Use virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. Use a firewall as a gatekeeper between your computer and the Internet. Firewalls are usually software products. They are essential for those who keep their computers online through the popular DSL and cable modem connections but they are also valuable for those who still dial in. Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection. Do not open e-mail attachments from strangers, regardless of how enticing the Subject Line or attachment may be. Be suspicious of any unexpected e-mail attachment from someone you do know because it may have been sent without that person�s knowledge from an infected machine. Regularly download security patches from your software vendors. --------------------------------------------- To unsubscribe, send to [EMAIL PROTECTED] Include in body: unsubscribe ctls-l For information on CTLS-L please visit: http://www.ctls.net/document/ctls-l.htm

