Malware Protection

Contact Us or call 1-877-932-8228
Malware Protection

Malware Protection

Malware is short for "malicious software." Malware is any uninvited software that behaves negatively on one's computer or device.

When communicating with staff, many opportunities present themselves for the introduction and spread of malware. A malware infection can cause major damage to company data and a loss of valuable time. The following are common ways that malware is spread:

  1. Opening shared files.
  2. Downloading software.
  3. Accessing websites.

Depending on the type of malware, the following may happen:

  1. Files may be corrupted.
  2. Information may be deleted off hard drives.
  3. Unwanted programs may run in the background.
  4. One's identity may be stolen.
  5. One's privacy may be invaded.

Malware may present itself in different ways. It may be malicious and damaging, it may be a simple prank, or it may even be inappropriate marketing. Some malware is simply the misuse of beneficial programs. The following is a list of common malware:

  1. Infectious malware:
    1. Viruses are executable programs attached to files.
    2. Worms are self-spreading executable programs.
  2. Concealed malware:
    1. Rootkits insure the malware stays on the system undetected.
    2. Backdoor malware bypasses authentication.
    3. Trojan horses are often used for marketing, and usually affect the web browser. They pose as something attractive to lure a person to open them.
  3. Profit seeking threats:
    1. Spyware steals information about the user.
    2. Adware is integrated with software and contains ads. Adware may also include spyware.
    3. Bots perform automatic activity over the Internet.
      1. Good bots include the Captcha applications that protect systems from spammers.
      2. Bad bots include email address harvesters.
    4. Cookies are used to remember authentication and for web personalization, but:
      1. Tracking cookies track browser activity.
      2. Poorly managed cookies may provide opportunities for hackers to intercept information.

Protection

There are many applications available to clean systems of malware and to protect systems from infection. Every computer should be protected with:

  1. Virus protection.
  2. Adware and malware protection.
  3. Firewall protection.

These systems are comprised of two parts:

  1. The engine.
  2. The database.

The engine is the program itself. It scans the computer, stores settings, and schedules scans. Database updates include information about the newest viruses. New malware is written regularly, so database updates are provided frequently.

To properly protect a system, the database should be updated before every scan, and the system should be scanned regularly.

Next