Email Viruses & Trojan Horses

Email-borne viruses and Trojan Horses, sent as attachments, are increasingly common. Virus software is available to help counter these threats, but user education is still vital, as most virus protection is reactive and will not catch all newer viruses and cannot protect against certain infection methods. Users are advised to observe the following guidelines.

Who is the email from?

What is the attachment?

No single method will provide complete protection from viruses and Trojan Horses, but the above methods, coupled with an updated virus scanning programming will go a long way to preventing problems. If you have any questions or encounter an attachment you are unsure of, please contact the Lab Staff.