The introduction of malware is associated directly with the activities of legitimate users of a system. Examples are:
Attaching portable storage device
Few decades ago, when internet was not a norm, portable storage device was commonly used to transfer files from computer to computer. Virus- infected file could be transferred from one computer to the other.
Opening an email attachment
Have you even received emails claiming that you ordered something on an on-line store, but actually you haven’t. Those emails usually come with attachments. One possibility is that the attached file states that you can return the goods if you do not want them by clicking a link. You would be redirected to a website which asks for your user account and password to confirm your returning. Stay alert and report the suspicious emails to the administrator of your IT department.
Accessing a website
Bogus website can be setup to obtain personal and private information, such as your user account and password to a bank account. The bogus website can be spread by instant messages. For example:
Lower case l(L) looks exactly the same as uppercase I(i). lCBC.com.cn and ICBC.com.cn, can you tell the difference? (The first one is lcbc.com.cn, and the second one is icbc.cn)
Downloading a file from the internet
Freeware in nowadays is very popular. Most of us are used to download software from internet. I believe that It happens a lot that dozens of applications that you do not intend to have are installed on your computer after you download an application and install it on your computer. To make matters worse, the files you download may contain viruses or be Trojan horses themselves. Always download file from the official website or official app store.