<<

1 | : WHAT YOU NEED TO KNOW

Ronald Walker Associates II, Inc.

Malware: What You Need to Know

www.rwacentral.com www.rwacentral.com 2 | MALWARE: WHAT YOU NEED TO KNOW

The importance of proactive network It’s easy to make the assumption security has never been more apparent that the leading cyberattacks causing than over the past eight years. unprecedented levels of disruption and loss are highly sophisticated. However, According to Symantec, more than 7.1 the latest reports show that’s no longer billion identities have been exposed in the case. Today’s cyber attackers data breaches. Data breaches have the have begun to rely more heavily on potential to cause massive amounts of straightforward approaches. disruption for business owners. Some data breaches are so severe that they Those approaches include taking cause business owners to permanently advantage of basic gaps shut down operations because they in operating systems and email systems, are simply unable to recover from such not to mention an uneducated workforce damage from cyberattacks. usually lax in detecting malware. Experts advise that knowing what you are dealing Symantec’s latest “ with and how to guard against the most Threat Report” illustrates the severity common attacks is critical to protecting of malware attacks, as well as how your company and your staff. those attacks are carried out. In 2016, the preferred weapon of choice for cyberattacks by hackers and cyber terrorists was mass delivery of malicious emails. Symantec found that one out of every 131 emails sent are malicious in nature, as well as seeing a 36% increase in new infections over the past year alone.

www.rwacentral.com 3 | MALWARE: WHAT YOU NEED TO KNOW

Being Aware of Malware Did You Know?

Malware has been one of the leading 1 out of every 131 emails are malicious causes of data loss and theft since the in nature. dawn of the internet. - Symantec

In 2014 there were as many as 274 million unique malware variants detected. The number of unique malware variants exploded to 355 million in 2015 and increased to 357 million in 2016. The increase from 2015 to 2016 may seem minor, but the overall impact of malware attacks over the past year has become far more severe. Viruses The key thing to understand about Viruses are notorious for making changes malware is that it’s all around us whether to the files on any infected computer. we’re currently using the internet or not. Those changes are designed to provide Network-connected devices are at risk, unauthorized access, or email accounts are vulnerable, and so otherwise, to hackers. Viruses generally on. That’s because viruses, ransomware, work by attaching themselves to , and so on are all different types executable files, which in turn infect the of malware. computer – or entire networks – that installed that file. “The pace and success of new The best-case scenario for viruses is that ransomware attacks makes it they are discovered and removed before one of the most dangerous cyber proper infection takes place. However, if crime threats facing businesses infection is not prevented they do have in the foreseeable future.” the potential to render individual computer and entire computer networks unusable.

www.rwacentral.com 4 | MALWARE: WHAT YOU NEED TO KNOW

Scareware spyware is patient and simply targets Anyone that was surfing the internet you – delivering vital information about in the 1990s is certainly familiar with your network, network security, and even “scareware”. This type of malware doesn’t internet habits to those responsible for hold files or data hostage in exchange for creating it. Spyware all too often goes a payday. Instead, scareware is meant to unnoticed because it attaches itself to trick/scare you into buying and installing seemingly benign executable files. you don’t actually need. Once running, spyware tracks every Many of the scareware attacks taking keystroke, every password entered, place today are occurring on both mobile email sent, etc. This information can devices and desktop/laptop computers, then be used and/or sold by hackers to but most are easily recognized by the gain unauthorized access to accounts request to click on any online ad or (including emails and financial) that you link that suspiciously redirects you to wouldn’t want anyone to have access to. something meant to scare you into buying something. Ransomware Ransomware was one of the most In some versions of this malware that significant threats to organizations in finds its way into your device, the 2016, and that threat only grows. Not computer locks up on a screen directing only have cyberattackers been perfectly you to contact a “support team” honing their so-called business model, pretending to be your operating system provider (such as Microsoft). These are shady third-party IT companies trying to get you to pay them to “fix” a problem they created, when they are not affiliated at all with your installed software vendor.

Spyware Where viruses actively infect and harm computers and business networks,

www.rwacentral.com 5 | MALWARE: WHAT YOU NEED TO KNOW

but they also have stronger methods on their side to remain Protecting Against Malware anonymous and escape detection or identification. The pace and success of The best way to protect yourself and new ransomware attacks makes it one of your organization from malware is by the most dangerous threats being proactive about improving and facing businesses in the foreseeable future. maintaining your network security.

For example, the average ransom amount Installing the latest out-of-the-box has increased by nearly 300%, according solution meant for individual, personal to Symantec, from $294 in 2015 to $1,077 computers isn’t going to do much to in 2016. protect an entire business network. While making sure you utilize the right tools is Ransom amount has a key component to thwarting malware increased by nearly attacks, knowing which tools are right for your business can be a bit complicated. 300% Aside from the standard software updates that often include security patches, $294 $1,077 avoiding links in unfamiliar or unnecessary emails, and implementing strong 2015 2016 passwords policies, it’s more important than ever to speak with actual malware The number of ransomware detections security professionals. At the very least, also increased by 36% from 2015 to having a conversation with experts in 2016. Detections of ransomware in 2015 business network security strategies for totaled 340,000 and the total number mitigating malware attack risks will give of detections for 2016 reported in at you and your team a better understanding 463,000. Ransomware is the number-one of how your network security efforts stack threat facing organizations today. up against evolving cyber threats.

www.rwacentral.com 6 | MALWARE: WHAT YOU NEED TO KNOW

Ronald Walker Associates II, Inc.

877.335.1928 | [email protected] | rwacentral.com

1452 Hughes Road, Suite 200 Grapevine, TX 76051

www.rwacentral.com