How To Protect Yourself From a Trojan
The name of the Trojan horse computer virus gives you a pretty good clue as to how this particular threat works. Just like the fabled Trojan horse, this virus masks itself as something desirable so you willingly let it into your system. Once it’s in, it releases all its little warriors to wreck havoc on your computer.
The good news is that, unlike other viruses, you have to actually do something proactively to let a Trojan horse into your computer. If you see every download and program as a possible threat, you’ll be able to protect yourself from harmful viruses much more effectively. Trojan horses are often sent through e-mail attachments, though they can hide in other places as well. Follow these steps to protect yourself:
• Never open an email from someone you don’t know
• Don’t download attachments from people you don’t know
• Don’t download attachments from contacts if you don’t know what they are (your contact’s email address may have been hacked)
• Scan all attachments and downloads with anti-virus software before downloading it if you’re sure that you want to receive the attachment
• Don’t download anything off the internet unless it’s from a reputable site
If you’re careful about what you invite into your computer, you can keep your network safe from Trojan horses. If you find that you have been infected, disconnect from the internet and your home or office network immediately. This will stop the spread of the virus. Use Trojan removal software or contact a professional to clean off your computer and restore it to a safe state.
Find the best ways to protect yourself from a trojan by going to our website.


