Skip navigation.
What if your email address could demand respect?

What is vulnerable on your computer?


Email, being the most common trusted method of communication transport, is the most frequently abused avenue into your computer. To protect this path, you must purchase a full feature email security product. Select a product that will protect your incoming email from multiple threats (Email Anti-Spam, Email Anti-Virus, Email Anti-Phishing and Email Anti-Spyware.) While some vendors will promote an all-in-one computer protection software package, you are best protected when purchasing your protection from an email security specialist as email security is a rapidly changing technology and attempting to deliver an all-inclusive “computer protection” product normally leads to average protection on all fronts.

Computer Virus Protection

So, your email security product has virus protection. This means that your incoming email is protected against delivering to you a virus “in email”. This is no reason to think you can overlook the need for computer-based Anti-Virus. An Anti-Virus solution loaded on your computer is an absolute necessity. Remember, your email security product only protects viruses coming in via email, you still must worry about malware (see The Threat) from floppy disks, and CD-Roms and your network connection. Again, we recommend going with a focused and credible Anti-Virus company.

Open Ports

To address the port problem, (See How These Criminals Get to You – Port Sniffing) software developers came up with the “Firewall.” This is a device that monitors these ports and gives the user control of what is “talking” out of the port or what is attempting to “talk” into it. The device may be a box located between your computer and the Internet -OR- it may be a piece of software the runs on your computer. The newer Software Firewalls monitor both the port and the software that are attempting to use the port. The benefit here is that if something changes the software that, in the past, was using a specific port, the user is warned. If this should occur and the user had just updated the software, this is not a problem. However, if the user accidentally downloaded a deceptive software application that may have attached itself to a trusted application, the user will be warned before the application can hijack any personal information.

Some Rules of Thumb -

  • Do not post anything at an unknown -OR- unsecured website -OR- send anything through electronic mail that you don't want the world to see.
  • Do not send private email or instant messages at work.
  • Be suspicious of any email that requests personal account information, such as solicitations for usernames, passwords, account numbers or any other personal data.
  • Do not assume any privacy when posting on a Web Log, also known as a Blog.

Do learn how a site will use your personal information, as in registering online to locate old friends or classmates, by reading the site's privacy statement.