Viruses or Phishing are threats that can cause arm to your computer or compromise your identity online.
What you need before you start
A computer virus is a program that can copy itself and infect files on your computer. These programs can do a variety of things such as erasing the files on your computer or cause harm to its functional performance.
The term virus is also used to refer to ad-ware, spyware, computer worms and Trojan horses. These are all programs that can compromise your online security. Viruses come in different formats such as images, links to web sites, downloadable/executable files, etc.
"Phishing" - is a general term for the use of fraudulent e-mail messages and web sites designed to deceive Internet users into disclosing their bank and financial account information or other personal data such as usernames and passwords. The "phishers" then take that information and often use it for criminal purposes, such as identity theft and fraud.
The messages and web sites used by phishers are designed to look like e-mails and web sites of well known legitimate businesses, financial institutions, and government agencies, often using the familiar logos of these organizations and imitating the look and feel of the legitimate web sites and email communications of these organizations.
Follow these easy steps
If you suspect an e-mail is fraudulent or comes from someone you do not know:
- Do not open the e-mail or attachment.
- Do not give any personal or financial information, such as e-mail or online banking username & password.
- Be aware of the customer communication policies of companies you do business with. Know what they will request by e-mail if anything.
- Do not click on any link provided in the e-mail. Contact the person or company by telephone, if possible, to confirm the e-mail is safe. If it is impossible to call the person or company, do not reply to the e-mail.
- Delete the e-mail message from your Inbox and your Trash folder.
- Make sure your anti-virus software is up to date.
We also recommend using Bell Aliant Webmail to check your e-mails before downloading them to your computer.
For more information on how to deal with these threats and how to report them, visit www.bellaliant.net/abuse.