From eScan Wiki
(Difference between revisions)
Revision as of 09:39, 13 September 2010 WikiSysop (Talk | contribs) ← Previous diff |
Revision as of 09:39, 13 September 2010 WikiSysop (Talk | contribs) Next diff → |
||
Line 51: | Line 51: | ||
==Best Practices for Recovering from System Compromises== | ==Best Practices for Recovering from System Compromises== | ||
| | ||
- | ''' | + | |
- | Here is a list of best practices that you can follow to recover from system compromises:''' | + | '''Here is a list of best practices that you can follow to recover from system compromises:''' |
# Read the description of the malware. If confidential information is stored on the computer, back up the data, format the hard disk, and then reinstall the programs. | # Read the description of the malware. If confidential information is stored on the computer, back up the data, format the hard disk, and then reinstall the programs. |
Revision as of 09:39, 13 September 2010
|
General |
Knowledgebase |
Support |
| · Articles · FAQ · Troubleshooting | · Technical Information - Main Page |
Security Awareness
Best Practices for Recovering from System Compromises
Here is a list of best practices that you can follow to recover from system compromises:
- Read the description of the malware. If confidential information is stored on the computer, back up the data, format the hard disk, and then reinstall the programs.
- Notify your bank or credit card company immediately.
- Cancel your existing credit cards or ask for replacement cards with new numbers.
- Change the passwords of the Web sites that you accessed while your computer was compromised.
- File a police complaint if your identity has been stolen.
Email us your feedback to solutions@escanav.com