Click on a question to show or hide the answer.
Malicious software first appeared at the same time as computers so it is not a new problem. However, the objectives of the perpetrators have changed.
Test the security of your computer and your knowledge:
For example, one sign that your computer may have been infected is if you are asked to provide unusual information such as your date of birth or social insurance number as you log on to AccèsD, and this despite the fact that:
What to do if you suspect your computer is infected
Some antivirus programs detect viruses faster than others, or detect viruses that others do not. Each virus has its own signature, and some programs are more effective in removing them from your system.
For informational purposes, here is a list of online scanners1 provided by Wikipedia.
Also for informational purposes, here is a list of antivirus software vendors1 provided by Microsoft.
1. The Caisse strongly recommends you install a full Internet security program that includes antivirus, antispyware, antispam and, antiphishing protection as well as a firewall. The lists provided may not be complete or correct. The content on the linked pages is not the property of the Caisse and their inclusion does not imply a preference, recommendation or business relationship with these third parties.
In order for your computer to be infected by a virus, you must have downloaded the file which contains it.
To avoid downloading an infected file:
Worms travel without any help from users and lodge themselves in your computer's random access memory (RAM). Worms replicate and spread from computer to computer in the same network or to computers via e-mail. Worms usually send out copies of itself to all the addresses in the infected computer's e-mail address book.
To keep your computer from being infected by a worm:
Trojan horses at first glance appear to be legitimate programs but do annoying or malicious damage to your computer. To be infected with a Trojan horse, the program must have been installed by the user. Beware of files that have two extensions, (e.g., photo-album.jpg.exe), which lead you to believe it includes photos but is actually an executable program (.exe).
To keep your computer from being infected by a Trojan horse:
Follow the following steps:
OR
Important: It is possible that your antivirus software may not detect the virus on your computer. This is why a manual search for the virus and extraction may be necessary. To do this, contact your computer support group and specify the virus name and I.D. number of the compromised computer.
If you do not have a computer support group, you may get help from an expert by contacting:
The Caisse cannot perform repairs on personal computers, phones and cell phones, or any other electronic or computer equipment belonging to the users of its services.
In the event your computer is infected by a computer virus, it is your responsibility, or the responsibility of the owner of the infected computer, to ensure that the equipment is repaired and secure once more.
Incidentally, The Caisse takes all necessary action to ensure sources of infection are closed down as soon as they are detected.