managing information technology for you

IT Security - the Real Threats

nescient it services

IT Security

Malware

The Malware threat is real. It is not always the world-shattering problem sometimes outlined in the pages of the press; nor is it always the non-existent "urban myth" suggested by others. nescient it services take the Malware threat very seriously...

So, what is Malware?

From Wikipedia:

Malware, short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including Computer Viruses, Worms, Trojan Horses, Ransomware, Spyware, Adware, Scareware, and other intentionally harmful programs. It can take the form of executable code, scripts, active content, and other software. Malware is defined by its malicious intent, acting against the requirements of the computer user.
What the...?

AND IN ENGLISH?

It is probably enough to know that Malware is something that you do NOT want on your computer. You didn't ask for it, it gets in the way and causes trouble.

Install MalWare Protection

You can avoid Malware...

...by installing security software which provides good protection against known threats. This is where nescient it services can help.

There are literally millions of different types of Malware infecting more computers than you might expect. In fact in a recent survey 48% of 22 million scanned computers were infected with Malware. As part of our Malware Protection service we will scan your computer to check for any infected files.

Removing Malware

If your PC has been infected with Malware, we will do our utmost to get rid of it.

Once Malware is removed your computer is still not immune from further threats. To protect your computer at all times, security software should be installed on your PC. If at anytime your computer comes into contact with a known Malware infection, the software should fix, quarantine or delete it before any damage is done.

Security programs are sometimes badly configured and out-of-date and will do little or nothing to protect the systems on which they're installed. There are many options for virus protection software, and we will discuss with you which is the best option for your circumstances. We will install and properly set up the right virus protection for you, and will work with you to ensure that it is kept up-to-date.

Types of Malware Threat

Over the last few years there have been several new types of threat to your computer and your files which have become increasingly popular with the "malicious element" of the Internet community. These threats take advantage of systems security weaknesses, many relying on confidence tricks to entice the user into unwittingly infecting their computer. In alphabetical order:


AdWare Adware: A software application that can display advertising banners while the program is running or via some other triggering mechanism is called Adware. Ad delivery systems are most often integrated into free applications as a way for developers to recover costs or generate revenue. A critical eye has been placed on Adware systems since in many cases, in addition to downloading ads, they may also upload user information collected without explicit permission.


Hackers Hackers: A hacker is someone that illegally gains entry to your computer for malicious purposes from the internet. Once full access is gained, a hacker can view any file on the computer. If your computer was to be accessed by a hacker, all your personal information would be open to them, for example: passwords, confidential documents etc. Most people aren't careful enough about their connection to the Internet. The chances of suffering from an ‘attack’ from some type of Internet hack are rising, especially when you connect to the Internet using high-speed connections (like cable or ADSL).


Phishing Phishing: Phishing is achieved by redirecting or misleading you from a genuine website to a fraudulent one through the use of a Malware program or a confidence trick. In a phishing attack, for example, a fraudster spams the Internet with email claiming to be from a reputable financial institution or e-commerce site. The email message urges the recipient to click on a link to update their personal profile or carry out some transaction. The link takes the victim to a fake website designed to look like the real thing. However, any personal or financial information entered is routed directly to the scammer and can then be used for criminal purposes.


Ransomware: Ransomware is a type of Malware that prevents you from using your computer or accessing certain files unless you pay a ransom. It often encrypts files so that they cannot be opened. Once installed, it may lock your computer and display a "lock-screen" with a message saying you must pay a ransom to regain use of your computer. This may be a fake message purporting to be from a scary source like the FBI or Metropolitan Police saying you must pay a fine. The ransom message typically includes instructions for how to pay the "fine".


ScareWare

Scareware: Scareware is a type of Malware designed to trick victims into purchasing and downloading useless and potentially dangerous software. Scareware, which generates pop-ups that resemble Windows system messages, usually purports to be antivirus or antispyware software, a firewall application or a registry cleaner. The messages typically say that many problems -- such as infected files -- have been found on the computer and the user is prompted to purchase software to fix the problems. In reality, no problems were detected and the suggested software purchase may actually contain real Malware.


Spam Spam: Spam is essentially unsolicited email. It is the email equivalent of all that junk mail that comes through your letterbox with the letters, birthday cards and cheques that you actually want! If your email address gets on to the wrong mailing list, then you will receive indiscriminate advertising messages..

The most unpleasant side of spam is the recent increase in mass emails which invite you to buy counterfeit goods, bogus qualifications, prescription drugs or pornography. These type of emails can be very offensive and often illegal. But why is it called 'spam'? SPAM® is a type of canned luncheon meat which dates back to the 1930s. The name SPAM® is derived from 'Spiced Ham' or 'Specially Processed American Meat'. In the 1970s Monty Python's Flying Circus® immortalised the SPAM® product in a well-known sketch. A customer wants a meal but has to have 'SPAM® with everything'. There is no choice, SPAM® comes with your meal whether you want it or not. And there is your link. Spam email is email that you get whether you want it or not!


Spyware: Spyware is a general term for a program that surreptitiously monitors your actions. While they are sometimes sinister, like a remote control program used by a hacker, software companies have been known to use Spyware to gather data about customers. The practice is generally frowned upon and can be used for criminal purposes or to gather information for marketing companies (some people might say this is the same thing!)


Trojan Horse Trojan Horse: Trojan Horse programs are impostors - files that claim to be something desirable but, in fact, contain a malicious element. A very important distinction between Trojan horse programs and traditional viruses is that they do not replicate themselves. Trojans contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must invite these programs onto your computers (for example, by opening an email attachment or downloading and running a file from the Internet).


Viruses Viruses: A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. While some viruses can be playful in intent and effect, others can have profound and damaging effects, such as erasing data or causing permanent damage to your hard disk, and worst yet, some are even designed with financial gains in mind.


Vulnerabilities: Windows® is the most widely used computer operating system. Both Microsoft® and Bill Gates are not popular in the malicious hacker community. These two facts make Windows® and other Microsoft® products (Edge, Office 365 etc...) the most obvious target for hackers. It is not uncommon for one or two new "loop holes" which allow hackers into your system to be admitted by Microsoft® each month. If you do not shore up your system by applying the latest "critical updates" to the key Microsoft® products you are leaving your PC vulnerable to attack. We can make sure that all the obvious routes into your PC are protected. For the not so obvious routes we recommend a firewall.


Worms Worms: Worms are programs that replicate themselves from system to system without piggy-backing or hiding inside another file (a host file). This is in contrast to viruses, which requires the spreading of an infected host file. The entire worm file will travel from computer to computer, often without you having to do anything other than have your PC connected to the internet. It is essential to reduce the number of ways that data can make its way onto (or off) your computer to reduce the chance of successful worm attacks.


Hacker Protection - Firewalls

Firewall A Firewall is piece of software (sometimes on dedicated hardware) that filters all the communication going into and out of your computer and compares those communication attempts to a list of rules to see if the communication should be allowed.

Most people are surprised when they discover that their newly installed personal firewall reports that their home computers are getting scanned or probed from the Internet multiple times per day.

nescient it services has had good experience of personal firewalls and their installation. Some personal firewalls are not very secure. Some are even downright insecure, providing only a false sense of security, which may be even worse than having no firewall at all! Some start only when you log onto your computer. This means that, depending on the kind of Internet connection you have, you may be exposed to the Internet before you log on.

As with Virus protection, when installing a firewall it is essential to choose the right tool for the job and to use that tool well. nescient it services can help you get it right!

Please contact us if you need help securing your devices.

Top