Trojan Horse's Mouth: What To Do When You Already Looked

John Storts
Slide Show

Five Security Predictions for 2012

Apparently, I have spent the remainder of my holiday budget on cliched advice, and I am fully prepared to pepper it with mixed, or at least mangled, metaphors. Regardless, good advice is good advice, like the adage "an ounce of prevention is worth a pound of cure." This nugget of shop-worn wisdom proves especially true of proactive strategies to protect workstations and business-critical information.


But, what about those times when no amount of precaution could prevent serious consequences? We all make mistakes, and on top of that, hackers, phishers, vishers and other black hats (sounds like a Dr. Seuss title, no?) capitalize on vulnerabilities, both of a human (weak passwords, for instance) and electronic nature (SQL injection, for another).


In other words, what should you do if you find a Trojan Horse or virus on your computer? In some cases, there may not be much you can do. But, all may not be lost. Check out these procedures from US-CERT to see how you can recover your files and applications and get everything back in good order.

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.