By Adrián Savarese
COVID-19 has forced companies to move to a WFH – Work From Home – scenario on a global scale. More than 20% of companies experienced a breach since widespread WFH started according to Malwarebyte, “Enduring from home COVID-19’s impact on business security” report.
But, Which are the different types of Malware that we are exposed to?
The term malware is a contraction of malicious software. It is any piece of software that is designed with the intent to damage, disrupt or gain unauthorised access to your device and inflict harm to data and/or people in multiple ways.
Viruses need an already-infected active operating system or program to work. Viruses are typically attached to an executable file or a word document. Usually spread via infected websites, file sharing, or email attachment downloads, a virus will lie dormant until the infected host file or program is activated. Once that happens, the virus is able to replicate itself and spread through your systems. A virus needs human interaction to spread.
Worms are spread via software vulnerabilities or phishing attacks. Once a worm has installed itself into your computer’s memory, it starts to infect the whole machine and in some cases… your whole network. They can infect large numbers of computers fast, consuming bandwidth and overloading your web server as they go.
It is a malicious program that disguises itself as a legitimate file. Because it looks trustworthy, users download it and once you’ve got the Trojan on your device, hackers can use it to: delete, modify and capture data, harvest your device as part of a botnet, spy on your device, gain access to your network and more.
It denies or restricts access to your own files. Then it demands payment, usually with crypto-currencies, in return for letting you back in.
Frustratingly, some of the very decisions that companies have made to better support their employees – to provide more software tools, to provide more devices, more flexibility -are the same types of decisions that can lead to a broader attack surface.
We invite you to visit our vertical Cybersecurity and see how we help companies to created better and safer products and services.
Image designed by Freepik – www.freepik.es