cyber attack 2

Cyber-criminals use different types of attack vectors and malware to compromise networks.

The five most typical types are viruses, worms, Trojans, spyware and ransomware. Computer viruses were originally spread through the sharing of infected floppy disks. As technology evolved, so too did the distribution method. Today, viruses are commonly spread through file sharing, web downloads and email attachments.

Computer worms have existed since the late 1980s but were not prevalent until networking infrastructures within organizations became common. Unlike computer viruses, worms can crawl through networks without any human interaction.

Trojans are designed specifically to extract sensitive data from the network. Many types of Trojans will take control of the infected system, opening up a back door for an attacker to access later. Trojans are often used in the creation of botnets.

Spyware is not typically malicious in nature, but it is a major nuisance because it often infects web browsers, making them nearly inoperable. At times, spyware has been disguised as a legitimate application, providing the user with some benefit while secretly recording behavior and usage patterns.

Ransomware is an attack that often encrypts the files on an endpoint or server demanding the end-user to pay a ransom in bitcoin to receive the encryption key. When it spreads to business-critical systems, the cost of the ransom can swell to hundreds of thousands of dollars.

Counter-attack #2 Ensure that your network is protected against all types of malware

All firewalls should safeguard organizations from viruses, worms, Trojans, spyware and ransomware.

This is best accomplished by integrating these protections into a single-pass, low-latency approach that blocks attack vectors not only at the gateway, but also at endpoints beyond the traditional perimeter. Look for features that include:

• Network-based malware protection to block attackers from downloading or transmitting malware to a compromised system

• Continuous and timely updates to safeguard networks around the clock from millions of new malware variants as soon as they are discovered

• Intrusion prevention service (IPS) to prevent attackers from exploiting network vulnerabilities

• Network sandboxing to send suspicious code to a cloud-based isolated environment for detonation and analysis to find never-before-seen malware

• Access security to apply security countermeasures at mobile and remote endpoints, both inside and outside of the network perimeter

• Email security to block phishing, spam, Trojans and social engineering attacks transmitted via email Ensuring each device that accesses your network is running up-to-date anti-virus software provides an additional layer of network malware protection. Pairing a PC running anti-virus with network firewalls can reduce many of the tools cyber-criminals have for compromising the network.


Cyber-attacks are on the rise, but there are effective defenses.

SonicWall has been fighting the cybercriminal industry for over 27 years, defending small, medium-sized businesses and enterprises worldwide. Combination of products has enabled an automated real-time breach detection and prevention solution tuned to the specific needs of the more than 500,000 organizations in over 215 countries and territories, so you can do more business with less fear.

When you are ready to evaluate SonicWall counter-attack solutions to fit your network environment call ACS on: (01) 846 4200