Managed IT Services for Small BusinessesOctober 12, 2015
These monsters are not campfire tales. These monsters are very real; they are after your customer’s money, personal information and computing resources. Knowing the enemy and how to defend against them is the key to security.
Meet the five most common malware monsters...
The goal of The Root Kit Monster is to provide remote access or control of a computer without being detected by users or security programs. It is a master of stealth and can prevent itself from being displayed in the list of system processes or prevent its files from being read.
Holds a computer system captive while demanding a ransom. This monster typically restricts access by encrypting the contents of the hard drive and displaying messages that are intended to force the user to pay a ransom to the malware creator.
Exploits operating system vulnerabilities and spreads over computer networks. Many worms are capable of creating bot-nets out of infected computers using your CPU and bandwidth for its own purposes such as DDoS.
Standalone malware program that disguises itself as a well-known or helpful program (such as antivirus) in order to convince a user to install it. This malware attempts to access financial or personal information in order to access financial accounts or sell information to those who would.
Prowls around for unprotected network devices and bypasses normal authentication procedures to install itself unknown to the user. Once this malware enters your system it opens a back door to allow remote access to your system leaving your data vulnerable to remote intruders.