Virus Prevention

The TCXMED Method

A computer virus is a program that can replicate itself and infect a computer. The term "computer virus" is often used broadly to describe all types of malware, including adware, spyware, worms, trojans, rootkits, and other malicious software. Regardless of the type, the result is the same: these programs can slow or stop a computer, steal data, and disrupt your entire operation.

So how do you protect your system from viruses? At TCXMED, we focus not just on protection, but on prevention. While it's impossible to guard against every evolving threat, it is possible to prevent many viruses from ever reaching your systems. Because most infections result from user actions, prevention starts with smart, safe computing practices.

In addition to basic guidelines—such as never opening emails from unknown senders or visiting untrusted websites—TCXMED follows five key rules for virus prevention:

  1. Depersonalize the Computer
    Remove personal items such as decorations, sticky notes, personal photos, or custom screensavers. The computer is a tool for work that supports the business and its staff. Reducing personalization discourages personal use, which often leads to exposure to risky content.

  2. Establish Ownership
    Each computer is company property, just like office furniture. Rotating devices among users periodically reinforces this concept and helps minimize the risk of storing personal—and potentially harmful—data on company systems.

  3. Use a Standard Background and Screensaver
    Set a consistent desktop background and screensaver on all workstations—ideally the company logo or a neutral image. This reinforces a professional environment and discourages non-work-related computer use.

  4. Maintain a List of Approved Sites
    Create and regularly update a list of approved websites needed for company operations. These should be saved as browser bookmarks on all workstations. The browser homepage should be set to the company’s website or another essential, low-risk site—not portals like Yahoo, MSN, or AOL, which are cluttered with external links.

  5. Implement Clear Access Rules
    Establish policies that restrict access to social media, personal email, and general news or entertainment sites. If offering personal internet access is necessary, set up a separate low-cost computer or wireless hotspot isolated from the office network. This connection should be dedicated to personal devices and kept separate from the main system to maintain network security.