From eScan Wiki
(Difference between revisions)
Revision as of 09:38, 13 September 2010 WikiSysop (Talk | contribs) ← Previous diff |
Revision as of 09:39, 13 September 2010 WikiSysop (Talk | contribs) Next diff → |
||
Line 50: | Line 50: | ||
==Best Practices for Recovering from System Compromises== | ==Best Practices for Recovering from System Compromises== | ||
- | + | | |
- | + | ''' | |
- | Here is a list of best practices that you can follow to recover from system compromises: | + | Here is a list of best practices that you can follow to recover from system compromises:''' |
# Read the description of the malware. If confidential information is stored on the computer, back up the data, format the hard disk, and then reinstall the programs. | # Read the description of the malware. If confidential information is stored on the computer, back up the data, format the hard disk, and then reinstall the programs. |
Revision as of 09:39, 13 September 2010
|
General |
Knowledgebase |
Support |
| · Articles · FAQ · Troubleshooting | · Technical Information - Main Page |
Security Awareness
Best Practices for Recovering from System Compromises
Here is a list of best practices that you can follow to recover from system compromises:
- Read the description of the malware. If confidential information is stored on the computer, back up the data, format the hard disk, and then reinstall the programs.
- Notify your bank or credit card company immediately.
- Cancel your existing credit cards or ask for replacement cards with new numbers.
- Change the passwords of the Web sites that you accessed while your computer was compromised.
- File a police complaint if your identity has been stolen.
Email us your feedback to solutions@escanav.com