Follow Jeremy Linkedin Twitter Facebook
Email Jeremy Email
Technology
Jun 3, 2021

These Are The Threats To Worry About

Sponsored Content provided by Jeremy Tomlinson - Owner, Enfuse Technology Solutions

An easy to read guide to the 9 most terrifying types of malware


It was so much simpler when we were growing up… if you borrowed a floppy disc from a friend and popped it into your computer, you ran the risk of catching a computer virus. The answer to this risk was simple: Most people installed antivirus software that protected their computers for them. And that was it.

But then two big things came along that changed everything: The internet – and greed.

You see, back in the day, most computer viruses were written for fun, and for the hacker to show off their skills. They were trying to break into computers and access information for the challenge, not the financial reward. These days, hacking is a profession. And a very lucrative one for some. The internet has made it very easy to access hacking knowledge and powerful automated tools. There’s also organised crime involved in modern day hacking. The criminals are systematic, thorough and ruthless with their attacks.

Believe us when we tell you that all businesses are being targeted by hackers all the time. The automated tools make this easy.

Don’t ever let anyone lull you into a false sense of wellbeing about your IT security. We at Enfuse see cyber-attacks on businesses virtually every day. Mostly we see evidence of failed attacks, as the businesses we look after are well prepared and protected. But occasionally we speak to business owners or managers we don’t (yet) look after, who’ve been successfully attacked. And the consequences can be devastating, depending on what has happened to them.

Anything that has been designed to steal your data or hurt your computer systems is now called malware – for “malicious software”. There are a number of different ways you can be targeted. Being aware is the first defensive weapon.

Here’s our guide to the nine most terrifying kinds of malware:

Viruses

Malware is much more than just viruses. Which is why you need a greater spread of defence than just antivirus software. Viruses can attack by infecting other files, deleting them, or reformatting them and making it very difficult to clean up. Often, viruses work by replicating themselves or by flooding networks, making it impossible for you to perform even simple tasks.

Clean up can range from difficult to virtually impossible. In many cases, to get things working again you will need to quarantine or delete the affected files. And possibly even rebuild the computers from scratch.

Worms

Worms have been around since the 90s. They work by just one person opening an infected email… which will then take down the whole network. The scary thing about worms is that unlike a virus, you don’t need to take any action to spread it. Worms replicate themselves and actually exploit other software to do their job for them.

You may have heard of the ‘iloveyou’ worm, which came out 21 years ago. It affected 50 million Windows machines across the world in just 10 days. That’s how powerful and unstoppable worms can be.

Trojans

Trojans – also known as Trojan horses after the Ancient Greek story – have replaced worms as popular hacking tools. They’re the new weapon of choice.

This type of malware takes advantage of its victim’s lack of security knowledge. It usually arrives in the form of an email attachment – and these are becoming more and more authentic looking, so it’s easy to be caught out.

Once you open the attachment… bang… it’s got you.

Trojans can also be pushed onto devices when you land on an infected website. This kind of malware is difficult to defend against, because they easy to write and are triggered by humans opening them in error.

Hybrids

You might associate hybrids with cars that are better for the environment. There’s nothing good about a malware hybrid. Look back at the first three kinds of malware we’ve talked about, and how difficult they are to protect against. Now picture the love child of two of these forms of malware quietly arriving to attack your business.

Terrifying. A hybrid is just that – malware with different attributes, such as the disguise of a trojan and the power of a worm. As you can imagine, with hybrids it can be very difficult to clean up after an attack.

Ransomware

This might be 5th on our list, but ransomware is the malware most feared by IT professionals. Ransomware is absolutely enormous right now. And businesses like yours are the prime target.

It works by encrypting all your data and holding it hostage. You literally have no data at all – no customer records, no files, no emails, nothing. Can you imagine how terrifying that would be?

The hackers demand you pay a ransom for them to free your data and give it back to you. This can be thousands of dollars often asked for in cryptocurrency (such as Bitcoin) which is harder to trace.

Most ransomware is a trojan, meaning it relies on someone accidentally triggering it by opening an attachment, or visiting an unsecured website. Sadly, this type of attack is very difficult to recover from – the financial impact can be huge – and that’s without paying the ransom.

Please make sure your files are backed-up regularly to avoid total devastation. And you and your team are trained to spot the symptoms of an impending attack.

Fileless malware

Technically this isn’t a different category, but I’ve included it because it poses a real threat to you and your business. Around half of all malware attacks are delivered by fileless malware, and this is growing all the time. Where ‘traditional’ malware relies on files to spread and infect, this form of malware relies on memory, or other fileless parts of your computer’s operating system. This type of attack is much harder to detect and to stop.

Adware

You’re on a website. There’s a pop-up. You click on it. And before you know it, some software is installed on your computer. Or there’s a new plugin to your browser. Or your browser no longer uses your search engine of choice.

Adware is often more annoying than dangerous. But it can slow computers down, or make you more vulnerable to other attacks. And anything that’s installed without your express permission is a pest and should be tackled.

Malvertising

Don’t you just love a good word blend?

As you probably guessed, malvertising is malware hidden behind advertising.

Don’t confuse this with adware. Malvertising occurs when a cyber-criminal pays for an advert on a genuine website. When you click on the ad, you’re either redirected to a malicious website, or malware is installed on your device. Sometimes even genuine ads are compromised. And even more scarily, sometimes you don’t even have to click the ad to be affected. This is called a drive-by download attack.

Spyware

Once again, a very descriptive name. Spyware is used to spy on you.

When installed, spyware can monitor the websites you visit, everything you type (this is known as keylogging) and any other information about you and what you’re doing on your device. It’s a good way for someone to find out your login information and passwords.

Spyware is activated when you click on something you shouldn’t, such as an attachment, a pop-up or notification. Or by downloading media from an unreliable source. Like adware, this is simpler to remove, but by the time you’ve noticed it, there’s the risk you’ve given away a lot of valuable information.


So there we have it. The 9 most terrifying types of malware and how they’ll affect you and your business. The impact that many of these forms of malware can have on a business ranges from simple lost productivity down to total bankruptcy.

This guide is just a simple summary. We don’t want to terrify you with facts and figures. But it’s safe for you to assume that you don’t want to deal with the fall out of a major attack on your business.

Remember what we said right at the start of this guide: All businesses are being targeted by hackers all the time. You need to make sure you’re doing everything you can to keep your business safe. This starts with creating a culture of taking your cyber-security very seriously.

Consult with a trusted IT support partner to find out the best blend of software, training and procedures to keep your business safe. There’s a lot that can be done to protect your business and its data from attack. But of course it needs to be done before an attack happens.

We’re here to make it very easy for you to take action. Most of the hard work can be done for you.

Let’s talk about becoming your IT partner. Click here to set up your consultation.


A UNCW alumnus and Army veteran, Jeremy has called Wilmington home since 1992. He started Enfuse Technology Solutions in 2011 to give small businesses a trusted IT partner to help navigate the quickly changing technology landscape. With almost 20 years of technical and management experience, Jeremy is passionate about helping people use technology. Experienced leading organizations through technological strategy and change, Jeremy loves helping businesses find out what they need from their IT systems to succeed.

Enfuselogo 422122447
Ico insights

INSIGHTS

SPONSORS' CONTENT
Burrus rob headshot 300x300

Spreading Wings for Flight: 2nd Annual Trade Show Highlights the Ingenuity of UNCW Business Students

Robert Burrus - Cameron School of Business - UNC-Wilmington
Tommytaylor ceo unitedway

How Philanthropy Fits Into Your Financial Plan

Tommy Taylor - United Way
Untitleddesign2

The Importance of Real Estate Appraisals

Steve Mitchell - Cape Fear REALTORS®

Trending News

Riverlights Could Add 73 More Townhomes To Mix, Site Plans Show

Staff Reports - Apr 18, 2024

Game Over For Michael Jordan Museum At Project Grace

Audrey Elsberry - Apr 19, 2024

City Approvals Push Forward Plans For Former Wilmington Fire Stations

Emma Dill - Apr 17, 2024

Surf City Embarks On Park’s Construction

Cece Nunn - Apr 19, 2024

Taking Marine Science On The Road

Lynda Van Kuren - Apr 19, 2024

In The Current Issue

Funding A Food Oasis: Long-awaited Grocery Store Gains Momentum

With millions in committed funding from New Hanover County and the New Hanover Community Endowment, along with a land donation from the city...


MADE: Makers Of Important Papers

W.R. Rayson is a family-owned manufacturer and converter of disposable paper products used in the dental, medical laboratory and beauty indu...


Taking Marine Science On The Road

“My mission and my goal is to take my love of marine science, marine ecosystem and coastal ecosystems and bring that to students and teacher...

Book On Business

The 2024 WilmingtonBiz: Book on Business is an annual publication showcasing the Wilmington region as a center of business.

Order Your Copy Today!


Galleries

Videos

2024 Power Breakfast: The Next Season