Cyber-attack strategy #2| Infect networks with different forms of malware
17 Apr 2019
Cyber-criminals use different types of attack vectors and malware to compromise networks.
The five most typical types are viruses, worms, Trojans, spyware and ransomware. Computer viruses were originally spread through the sharing of infected floppy disks. As technology evolved, so too did the distribution method. Today, viruses are commonly spread through file sharing, web downloads and email attachments.
Computer worms have existed since the late 1980s but were not prevalent until networking infrastructures within organizations became common. Unlike computer viruses, worms can crawl through networks without any human interaction.
Trojans are designed specifically to extract sensitive data from the network. Many types of Trojans will take control of the infected system, opening up a back door for an attacker to access later. Trojans are often used in the creation of botnets.
Spyware is not typically malicious in nature, but it is a major nuisance because it often infects web browsers, making them nearly inoperable. At times, spyware has been disguised as a legitimate application, providing the user with some benefit while secretly recording behavior and usage patterns.
Ransomware is an attack that often encrypts the files on an endpoint or server demanding the end-user to pay a ransom in bitcoin to receive the encryption key. When it spreads to business-critical systems, the cost of the ransom can swell to hundreds of thousands of dollars.
Counter-attack #2 Ensure that your network is protected against all types of malware
All firewalls should safeguard organizations from viruses, worms, Trojans, spyware and ransomware.
This is best accomplished by integrating these protections into a single-pass, low-latency approach that blocks attack vectors not only at the gateway, but also at endpoints beyond the traditional perimeter. Look for features that include:
• Network-based malware protection to block attackers from downloading or transmitting malware to a compromised system
• Continuous and timely updates to safeguard networks around the clock from millions of new malware variants as soon as they are discovered
• Intrusion prevention service (IPS) to prevent attackers from exploiting network vulnerabilities
• Network sandboxing to send suspicious code to a cloud-based isolated environment for detonation and analysis to find never-before-seen malware
• Access security to apply security countermeasures at mobile and remote endpoints, both inside and outside of the network perimeter
• Email security to block phishing, spam, Trojans and social engineering attacks transmitted via email Ensuring each device that accesses your network is running up-to-date anti-virus software provides an additional layer of network malware protection. Pairing a PC running anti-virus with network firewalls can reduce many of the tools cyber-criminals have for compromising the network.
Cyber-attacks are on the rise, but there are effective defenses.
SonicWall has been fighting the cybercriminal industry for over 27 years, defending small, medium-sized businesses and enterprises worldwide. Combination of products has enabled an automated real-time breach detection and prevention solution tuned to the specific needs of the more than 500,000 organizations in over 215 countries and territories, so you can do more business with less fear.
When you are ready to evaluate SonicWall counter-attack solutions to fit your network environment call ACS on: (01) 846 4200
Trend Micro Worry Free
Gallant Security Systems Limited have used our payroll system for the last 15 years and never had a reason to look elsewhere for this service. Also the after sale service from ACS is second to none and we would have no problem in recommending both BrightPay payroll software and ACS.
ACS have always been a pleasure to work with. They are honest and fair to customers, knowledgeable and always willing to help. I wouldn’t hesitate to recommend Ronan and his team in ACS as a company to work with.
ACS have been a supplier to my business for a number of years and they have provided an exceptional service, especially in challenging technical environments. With very competitive rates, they continue to offer superb commitment to my business.
error: Content is protected !!
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.