Computer repairs and PC support, Nailsea, Clevedon, Portishead


Computer Security... 

Cyber Crime is becoming a major world wide problem.  You need to protect your personal information from a wide range of attacks, from viruses and telephone scams.  It is vital, therefore, that you have an efficient anti-virus package with a good firewall installed on your PC. 

However, it doesn't matter how good your anti-virus software is, if you give someone permission to access your PC remotely, whether by clicking on a link contained in an email or by allowing remote access, they will be able to bypass whatever security you install!

You should always follow these simple rules...

  • Never allow anyone to remotely access your PC unless you explicitly trust them.  DO NOT ALLOW ANYONE WHO TELEPHONES YOU OUT OF THE BLUE TO REMOTELY CONTROL YOUR PC NO MATTER HOW GENUINE THEY SOUND. 

  • Always install a good quality Anti-virus package.  We recommend Bullguard, but Norton and Kaspersky are also very good.  The free packages, such as AVG and Avast offer good, but basic, protection - remember when it comes to PC security you get what you pay for.

  • Install Malwarebytes free anti-malware software.  Malwarebytes offer both free and a paid for packages.  Their paid for package does offer excellent all round protection.  Malwarebytes is an excellent backstop, finding malware and viruses that the main packages often miss.


  • Never open attachments unless you are expecting them. Remember some viruses will appear to come from people who you know and trust. Get your correspondents to email a confirmation email first.  Be suspicious of emails from UPS, FEDEX or other companies giving details of parcel deliveries, purchase orders or invoices you are not expecting - a common way of distributing Ransomware.

  • A lot of people share jokes, cartoons and funny animation and send them to each other in emails. Most are fine but some will be infected.  It is safer to ask people not to include you in their distribution list.

  • Look at the wording of emails carefully. Many (if not most) virus infected emails come from people whose first language is not English - look out for poor grammar, wrongly used or mis-spelt words etc.

  • When deciding on an email address avoid using your name, e.g. avoid Spammers often randomly put first and second names together with common ISP addresses. Use a nickname or alias, e.g. This will reduce the incidence of spam if nothing else.

  • Choose a 'strong' password.  Passwords should be 8 characters or longer and comprise of a mixture of uppercase and lowercase letters,  numbers and symbols.  Avoid peoples or pets names, parts of your address, birthdates etc. because they are too easy to guess.  Never use the same password on every site you visit.  It is probably impossible to have a different password for every site you visit. At the very least, use different passwords on shopping sites or on-line banking sites.

  • Only give out your email address to people you trust - make sure they also run Anti-Virus software.

  • If you run a network, never 'map' a network drive. Some viruses are 'network aware' and will treat a mapped network drive as a local drive and so infect it.  In some cases you cannot avoid using 'mapped drives'.  It is particularly important, in that circumstance, that you maintain strict discipline, as far as PC security is concerned.

  • Be careful what you download from the web - pirated music and software from sharing sites is frequently infected.

  • Microsoft issues updates to Windows weekly.  These updates include security improvements which are vital to keeping your PC secure.  Never turn off Windows Updates.

For the latest information and advice, or to report an attack on your PC visit  Actionfraud UK is a website setup by Police in the UK to help combat on-line fraud.

Telephone Scams...

It is becoming more common for fraudsters to telephone unsuspecting people claiming to have identified a problem with their PC and offering to fix it.  They download a small program that enables them to remotely control your PC.  Whilst doing so, they have pretty much unlimited access and are able to copy files to their own computers without you knowing they are doing so.  They can also install viruses or software that locks your PC until you pay them an 'unlocking' fee.  Frequently, they install software that searches your PC for credit card or back account details. 

The reality is that  it is impossible for anyone to tell that your PC is faulty or is infected with a virus.  IF ANYONE TELEPHONES YOU OUT OF THE BLUE CLAIMING THEY HAVE DETECTED A PROBLEM WITH YOUR PC SIMPLY PUT THE TELEPHONE DOWN.

Ransomeware overview...

Many fraudsters distribute viruses via email.  They either attach a file to the email, which infects your PC when you open it, or insert a link in the email which takes you to an infected website.  These viruses can either encrypt your hard drive stopping you from accessing your documents, photos, email or programs without paying a fee.  This is called ransomware and is becoming very common.  Once your hard drive is encrypted there is nothing that can done to recover your data. 

Ransomware is typically distributed via email.  You may receive an email that looks as if it comes from a genuine company, often UPS or Fedex.  They contain a link, supposedly taking you to a webpage that gives information about a shipment they claim they are sending to you.  This link installs the encryption software and then encrypts your PC.  When ever you try to open a file a window appears  telling you that the file is encrypted and tells you how to pay to have the files un-locked. 

The software is very clever and searches your hard drive for files to encrypt.  You a PC is a part of a network and has a 'mapped' network drive, i.e. a connection to a folder an a server, for example, it will encrypt the files on the server as well.  This can be disastrous for a company if there is no backup.  You should bear in mind that if you leave a backup drive permanently plugged into your PC this will be encrypted as well. 

Clearly, the best way to avoid being hit by a ransomware attack is not to follow links or open attachments you are not expecting.  However, the fraudsters are becoming increasingly sophisticated and it can be difficult to recognise that you are being attacked.  It is vital, therefore, that you backup important files to an external drive (or memory stick) on a regular basis.  However, you should only plug the external drive in when you actually run the backup and unplug it once the backup has completed.

Rootkit Virus overview...

The most common forms of rootkit either damage the PC’s they infect or redirect the systems' resources for purposes ranging from pranks to gratifying their authors' egos to crime. Some are simply utility applications. An example of the latter is a rootkit that provides CD-ROM emulation capability allowing video game users to defeat anti-piracy features that require the original installation media. Rootkits can test resistance to assorted potential attacks. However, malicious rootkits siphon and transmit private/sensitive data, for example: PINs, account passwords, credit card particulars, etc. Some rootkits can operate successfully upon multiple operating systems.

Trojan horse overview...

A Trojan horse is similar to a virus in that it can harm your computer, however it is potentially more dangerous. This is because it sits on your machine and waits quietly to be triggered by a malicious user on the Internet who has installed it on your computer before it wreaks havoc.

The 'trigger' is usually a particular date in the future, but it can be something as simple as waiting for you to install a certain piece of software on your computer. Some can even be activated remotely by their authors (the malicious users), as and when they want to gain access to and control of your computer.

Gryphon Computer Support - PC Support, PC Repairs, virus removal,web design, Nailsea, Portishead, Clevedon, Wrington, Yatton

Trojan horse programs can be used to take complete control of your PC by an unauthorised third party. They are often used to steal information such as Internet banking details for malicious (and commonly, fraudulent) purposes.

In some extreme cases, identity theft can take place as a result of sensitive and confidential information being stolen from a computer by a user using a Trojan horse installed on that machine. This is when someone uses personal information about another person in order to pretend to be that person. As one can imagine, the consequences of this can be very serious indeed.

What to do if you get virus warnings from others...

Virus hoaxes are very common. If you get an email from someone warning of an imminent virus attack treat it with a pinch of salt. It's almost certainly a hoax. And, whatever you do, don't pass the warning on without checking first!

By passing a warning on, you may feel you're being a good Samaritan. But if it's a hoax, you are actually adding to it and helping to spread the hoax to other users. This in turn causes unnecessary panic amongst people, which is exactly what the originator of the hoax wants to happen.

You should independently verify for yourself that it isn't a hoax by visiting Symantec's Anti Virus Research Center and searching their hoax database.

If it is there, then simply ignore the hoax and do not action it. However, if it isn't there, then, and only then, pass the warning on. Remember, Chinese whispers can cause damage!

What to do if your computer is infected by a virus?

First and foremost, you should run your virus checking program on your machine to detect and remove the virus. As new viruses emerge all the time, make sure you have updated your anti-virus software with the latest virus definitions.  If you can, download and run the free version of Malwarebytes. 

If you are unable to remove the infection then please contact us on 01275 857990.

If you do not have any anti-virus software installed on your computer, we strongly advises that you download and install such software immediately, so that

PC Repairs and PC Technical Support,Ruan Minor, Cadgwith, Mullion, Lizard, Helston