Enterprise Anti-Virus & Protection Solutions
Anti-Virus Protection for your business
Most of the time, people tend to think of any threat to our computers as a virus. However, viruses are just one type of malicious threat that fall under the broad category of malware. Protecting your computer starts with understanding the different types of malware and how they work.
Viruses can replicate themselves and damage computer files that they target. They attach onto executable files such as songs and videos. As a result, this allows them to easily transfer across the internet from user to user. In addition, viruses can only attack files if they have the support of an active host program.
Common types of viruses include:
- File virus: Infects executable files
- Macro virus: Infects programs that contain macros such as Word, Excel, and PowerPoint files
- Master Boot Record (MBR) virus: Infects the Master Boot Record (MBR) of hard drives
- Boot Sector Virus: Infects the boot sector of floppy disks
- Multipartite Virus: Infects both the boot sector and executable files
- Polymorphic virus: Infects data types and functions
- Stealth Virus: Infects operating systems processes
Worms don’t need an active host program to cause damage, but they can still replicate themselves. For instance, once a worm infects your computer, it can self-replicate and spread to other computers via the network or Internet connection. As a result, worms can harm your computer by consuming network bandwidth and injecting additional malware.
Trojans attack someone’s computer by disguising themselves as seemingly harmless programs. Often times, users are tricked into loading and executing Trojans on their computers. Once on your computer, Trojans copy, modify, delete, and steal sensitive data.
Common types of Trojans:
- Backdoor Trojan: Creates a “backdoor” and provides the attacker access to the user’s computer
- Downloader Trojan: Downloads additional content onto the infected computer
- Infostealer Trojan: Steals information from the infected computer
- Remote access Trojan: Provides the attacker full control over the user’s computer
- Distributed Denial of Service (DDoS) attack Trojan: Infects a computer’s network by flooding it with traffic
Bots, or robots, are an application that executes automated tasks on the user’s computer. Once a bot has infected a computer, it connects to the central servers and forms a network of infected computers. This is known as a botnet. Through a botnet, an attacker can use large-scale spam campaigns such as DDoS attacks on computer networks.
Adware displays download unwanted advertisements on the user’s computer. They are pop up ads or website redirects to advertising websites. If the adware doesn’t notify the user that it is taking their information, it is considered malicious and may contain spyware. Spyware collects data from computers and sends it to a third-party source without the user’s consent. From here, it can look at your web activity, access emails, and steal confidential information.
Ransomware blocks the user from using their computer until they pay a “ransom” fee. It does this by restricting your computer’s data with a file encryption. In order to receive the encryption key and unlock the data, the user has to pay the ransom fee.
How can you protect your computer? Here are a few simple tips:
- Keep your system up to date
- Install antivirus software and perform regularly scheduled scans
- Set up a firewall
- Don’t open any suspicious links or files on the internet
If you still have additional questions or are unsure how to fix a problem involving any malicious threat to your computer, we are here to help!
Our Trusted partners that provide comprehensive endpoint protection, detection, and remediation:
- Multi-Vector Protection
- Threat Visibility Dashboards
- Integrated Remediation Engine
- Centralized Management
- Malware protection software installation
- Malware protection management & support