Skip to main content

Countrywide Continues Torrid Pace

Nov 14, 2002

Defending Your Computer, Part IIITom Estesvirus, backup, internet utilities Since my last article, in the June 2002 edition of The Mortgage Press, entitled, "Surviving the Computer Security War," my computer has been attacked 13 times! Fortunately, I had taken the time and effort to secure my system, or it could have been irreparably damaged. Computer security entails refusing the entrance of any uninvited person or program which might be trying to control or damage your personal computer or network. It should be as much of a priority as locking the doors to your home or office. In the past two installments of this three-part series, it has been established that, if you surf the Internet, utilize e-mail or transmit any data electronically, you will eventually be the victim of some security event, whether it be minor or catastrophic. The degree of devastation is controlled by you, because it is directly proportionate to how prepared you are. In my previous article, I focused on four ways in which you can defend your system from assault, including: ++Obtaining, utilizing and updating anti-virus software; ++Deploying a firewall; ++Downloading patches for your programs; and ++Downloading and deploying program service packs. In addition to these tips, there are three additional strategies which will help to avoid and survive attacks on your system. 1. Craft and deploy rules for office e-mail, since that is how most viruses are transmitted. You can distribute them just like you would an employee handbook. To help get you started, let me make the following suggestions: ++Make sure your program is set to scan incoming e-mail for viruses. This may sound obvious, but not every program is automatically configured for this. ++Be cautious about opening e-mail from someone you do not know, and if you do not recognize a particular piece of e-mail, then delete it! If you are using Microsoft Outlook or Exchange, then you can set an auto-respond feature which will send people a copy of your policiy. ++Even if you know the sender, pay attention to the e-mail's subject line; if it seems out of character with that person, then delete it. For example, if you receive an e-mail from your pastor that says, "Check out these party pictures!" you can pretty much assume you should delete it. Call the sender and clarify, though, you can always ask them to resend it. ++Never, under any circumstances, open executable attachments, which contain the extension, "exe," because that is how most viruses are transmitted. 2. Develop a relationship with a computer expert before you need their services. Nobody waits until they are sick to find a good physician, so why would you wait for a major security breach before seeking out a service expert? You can search the phone book or ask your local computer store for a recommendation. The most important thing is to conduct an interview with any potential candidates. Take an application, and then get the names and numbers of at least three for references. Inquire about the service person's response time and commitment to the project, and impress upon them that you are looking for a long-term relationship with someone who can help keep your system operational and respond quickly when needed. Seek out their advice on what you need to do in order to recover from a major security event. Besides, if you wait until you need an expert to call one, it will probably require more of your money and time, so stay ahead of the curve. 3. The final and most important piece of advice is to back up your data. Even the most knowledgeable professionals get hacked (ask your new IT expert). Using the tips above will help you avoid most viruses, but you need to come to terms with the fact that no program is foolproof. So, the final and most important tip is to backup all of your files. Even experts get hacked and are susceptible to viruses, but you can lessen your chances by taking these precautions. You need to operate as though you know you are inevitably going to get a virus or experience a security violation. If you knew that your house was going to be robbed, wouldn't you get insurance? That is what backups are all about--having insurance for your data. With the price of CD writers falling, there is no excuse not to get one. CD-Rs are as cheap as floppy disks and hold more than 500 percent more data. Backing up your files is the single most important thing you can do to prevent a virus from wreaking havoc on your company. You can backup your entire system or just your data. If you have kept the reinstall disks for your application programs, it is not as critical to back those up, however, you do need to back up your databases, documents, spreadsheets, customized templates, cookies and e-mail address books. That is your work, so make sure you protect it. You are the only one who knows how often to back up your records. Ask yourself how much information you can afford to loose, and gauge the back-up frequency accordingly. The business world is full of potential hazards, but good professionals know how to lessen their exposure to risks. The personal computer has become a very important part of business, but in the worst of cases, the computer is a hazardous open door through which the world can gain access to your important and confidential business files. A secured system is what the personal computer is designed to be--a tool to make your business better and more efficient. So, do your part to ensure that it stays that way. Tom Estes is Technology and Publications Chair of the North Carolina Association of Mortgage Professionals and regional manager of American Residential Mortgage. He may be reached by phone at (877) 327-9684, fax at (888) 445-0393 or e-mail [email protected].
About the author
Published
Nov 14, 2002
156 Newrez Employees Laid Off In Florida and Pennsylvania

WARN Notices were filed the day after SLS merged into Newrez LLC

May 07, 2024
Ishbia Predicts A Rate Cut By Election Day

CEO of United Wholesale Mortgage shares 'personal perspective' in new YouTube video

May 03, 2024
UWM, UMortgage Under Attack For Alleged Shell Scheme

A report released on April 25 by the hedge-funded media company alleges UWM set up a shell company, UMortgage.

Apr 25, 2024
More Questions Than Answers At Housing Finance Climate Summit

Government officials, housing leaders, and climate scientists meet to address climate change's escalating impact on housing.

Apr 22, 2024
Maximum Acceleration, Originator Connect Network Sign Exclusive CE Agreement

Pact gives OCN guaranteed live CE at shows, creates nationwide opportunity for Maximum Acceleration

Apr 17, 2024
CMG Acquires Norcom Mortgage's Retail Side

The 25-branch addition will enhance CMG’s northeastern presence from Maryland to Maine.

Apr 12, 2024