Let’s find what you’re looking for. Search our resources, blog, pages, and any other content on our website.
Could your business be hit with a malware attack? The answer, unfortunately, is yes. Whether you’re relatively large or small, and no matter the precautions you take, your company likely has some vulnerabilities that could be exploited with malware.
A recent article in Health Data Management reported that one in four health care organizations — which tend to employ more stringent security to comply with HIPPA or other privacy regulations — suffered at least one malware attack that got past their security in the last year. That is in spite of 94 percent of the organizations reporting that they used firewalls, and 82 percent said they ran software designed to catch malware in real time. If companies in the more-secure health industry aren’t able to prevent attacks, it’s going to be a challenge for your small to medium-sized business to do so. To increase your odds of keeping away malware, learn about the common types of this malicious software and how you can protect your company.
Here’s what you need to know about the five common types of malware that you may be attacked by, with varying levels of damage.
A virus infects one program, then replicates and spreads across several computers or devices with that program. Usually their intent is harmful; viruses may take over hard drive space or processing time, or they may corrupt data on your computer. Some viruses can, for example, access your email contacts and spread via emailing themselves to other users.
Spyware is designed to access and take personal information, such as login and password information or bank account details. Spyware can also slow down your computer and cost you in productivity. Some spyware isn’t particularly malicious — it may simply track what websites you visit and display relevant advertising to you. But if it is running without your consent and accesses your personal info, even if doing so is not obviously harmful, it is considered spyware.
Like the name implies, ransomware takes over your computer, locks its use or access to certain files, and demands that you pay for the lock to be removed. Because the software that does this is usually created to generate a random encryption key, it’s difficult to decrypt and restore data.
Trojans, named after the infamous Trojan horse from ancient Greek history, are a method of delivering malware by piggybacking on something that seems innocuous. They may be downloaded via an email attachment or from a link that looks legitimate. The Trojan itself typically isn’t malicious, but it lets in a virus or worm that is.
The purpose of a worm is to rapidly spread to other computers via a network. In some cases, they don’t do anything overtly bad, but they take up bandwidth and processing resources and can slow down a network, leading to lost productivity. One use of worms is to create a “backdoor” or method for hackers to break into the computer system. The system can then be used to send out spam or attack other networks.
When it comes to malware, nothing is completely foolproof, but taking smart measures to combat malicious software will keep out the bulk of attacks.
One of the most important elements in preventing a malware attack is to have knowledgeable IT professionals who can prevent attacks, keep software up to date and spot threats before they do damage. Contact us to learn more about how our IT pros can reduce the risk to your company.