SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
A presentation given Simon Pell
Director Wardour Secure Networks
Ltd at the BizGen Conference and
           Expo Lincoln
What is Malware?
   Are you protected?
All the various threats can be called


                     Malware
  The word malware comes from the
combination of Malicious and software.
  It refers to viruses, worms, spyware,
adware, hoaxes etc etc.
Did you know that over 90% of small
businesses have anti-virus solutions in place?

Yet almost half are still getting attacked by
e-threats!!
What’s a Virus?
A virus is a piece of code or software that
is designed to damage your files and
programs, they are designed to replicate and
spread to other computers via email or across
your local area network (LAN).
What is a Trojan?
What is a Trojan?

        As the name suggests a trojan is a piece of
malicious code disguised as an apparently harmless
program, which in many cases when run releases the
malicious code hidden in it.
   Unlike viruses trojans do not self replicate, but like
viruses they are designed to destroy files or programs. In
many cases they can capture and resend data to external
addresses or open the PC to be controlled by remote users,
referred to as @cyber-crooks', usually there to steal
passwords and banking information. Definitely not what a
small business needs.
What is a Worm?

    Worms are programs that make copies of themselves in
different places in your PC.
    The object of this is to slow your PC or network down to make it
unusable. Unlike viruses they do not infect files.
    Worms are usually spread using social engineering, they make
them to look attractive by use of attractive names to hide the files.
Most popular names relate to sex, famous people, free software
anything to make them seem appealing.
    Worms are more geared to make financial gain and bring
notoriety to the creator.
    Most recently reported in the press was the cornflicker virus.
What is a RootKit?
      These are programs designed to hide objects
      such as files, windows registry entries or
processes.
      A rootkit itself is not malicious but is used by
      writers of malware to cover their tracks in
      infected computers.
      The first examples of malware using rootkits
             to hide themselves appeared in 2005.
Spyware, Adware and Bots added these
characteristics    to     their own to try to avoid
detection.
Spyware/Adware

        Spyware and Adware are programs that display adverts
associated with the product or service being offered by the creator of
the program. It can be installed in a number of ways, in many cases
without the users consent or without knowledge of its function.

        The term Adware and Spyware can be controversial, as a
rule they are not used for criminal intent but to advertise products ad
services. information collected does not include bank details but
more like web pages visited or favourites etc.
What are Cookies
What are Cookies

        Cookies are small text files stored on a computer by your
web browser after visiting a web page. The information stored by the
cookies has a number of uses. It can be used to personalise a web
page for the next time you visit, to collect demographic information
about the visitors to the page or to monitor banner clicks.

      A good example is when you revisit a page and it says
"Welcome back <your name>" such as Ebay or Amazon etc.

         While a cookie in itself is not malicious it could be used by
malicious code to affect a users privacy as it can create a users
profile of browsing activity and send it to third parties.
Summary
Virus- Self replicates and infects
Trojan – Does NOT Self Replicate and infects
Worm – Copies itself to various parts of a computer , DOES
NOT infect.
Rootkit – Does not replicate and does not itself infect.
Cookies – Text File that stores information.
Spyware/ Adware – Advertise products to the user based on
sites visited.
Protection
      Always use a reliable security program or
regime
                   KEEP IT UPTO DATE
       Don't download content from pages unless you
are confident of their reliability.
  Keep a close eye on all downloads made within
your network, as a small business you are liable for
the employees use of the internet.
  Use a good firewall.
  If you are unsure seek advise and
                           DON'T PANIC!!!
Firewalls
Firewalls

     Watchguard
Firewalls are usually hardware devices
designed to protect your network from
intrusion, unauthorised access and more.
FAQ

1.Will it slow my connection to the internet?
2.Can I still access websites?
3.Can I still send and receive emails?
4.Can I still watch YouTube or access
  facebook/Twitter?
Slowness: with the right firewall configuration
you shouldn’t notice any change to
performance.
Websites: can still be accessed but you can
control what employees look at.
Emails: are still sent and received but you can
reduce spam.
Social Media: can still be accessed but you
can control it better.
UTM Suite
UTM is unified threat management.
Application Control
Reputation Enabled Defence
WebBlocker
SpamBlocker
Gateway AntiVirus
Intrusion Prevention
Application Control
With XTM application control you can
block more than 1800 web and business
applications.
     More precisely you can control access to
more than 1800 web and business
applications.
     You can BLOCK, ALLOW and REPORT
on who has access to what.
How will a firewall benefit a company

Reduces time wasted by workers
Improved productivity
Prevent malware or illegal downloads
BizMidlands.co.uk

Weitere ähnliche Inhalte

Was ist angesagt?

Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Ppt123
Ppt123Ppt123
Ppt123Faiz Khan
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Security threats
Security threatsSecurity threats
Security threatsQamar Farooq
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAlfred George
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 

Was ist angesagt? (20)

Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Ppt123
Ppt123Ppt123
Ppt123
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
MALWARE
MALWAREMALWARE
MALWARE
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
spyware
spywarespyware
spyware
 
Anti virus
Anti virusAnti virus
Anti virus
 
Spyware
SpywareSpyware
Spyware
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Security threats
Security threatsSecurity threats
Security threats
 
Adware
AdwareAdware
Adware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 

Ă„hnlich wie What is malware

Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 
Malware Infections
Malware InfectionsMalware Infections
Malware InfectionsJessica Howard
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docxSarahReese14
 

Ă„hnlich wie What is malware (20)

IT viruses
 IT viruses IT viruses
IT viruses
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Computervirus
Computervirus Computervirus
Computervirus
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 

Mehr von Malcolm York

Smartworks brochure
Smartworks brochureSmartworks brochure
Smartworks brochureMalcolm York
 
Social media marketing for business
Social media marketing for businessSocial media marketing for business
Social media marketing for businessMalcolm York
 
Business continuity
Business continuityBusiness continuity
Business continuityMalcolm York
 
Social media - employer considerations
Social media - employer considerationsSocial media - employer considerations
Social media - employer considerationsMalcolm York
 
10 business boosting tips for marketing
10 business boosting tips for marketing10 business boosting tips for marketing
10 business boosting tips for marketingMalcolm York
 
Data can be dynamite
Data can be dynamiteData can be dynamite
Data can be dynamiteMalcolm York
 
5 simple seo tweaks,tips and tricks
5 simple seo tweaks,tips and tricks5 simple seo tweaks,tips and tricks
5 simple seo tweaks,tips and tricksMalcolm York
 
Tax planning for sme's
Tax planning for sme'sTax planning for sme's
Tax planning for sme'sMalcolm York
 
11 step blogging guide
11 step blogging guide11 step blogging guide
11 step blogging guideMalcolm York
 
Lincs networking final 23 8-2011
Lincs networking final 23 8-2011Lincs networking final 23 8-2011
Lincs networking final 23 8-2011Malcolm York
 
Linked in workshop
Linked in workshopLinked in workshop
Linked in workshopMalcolm York
 
Lincs Business networking presentation
Lincs Business networking presentationLincs Business networking presentation
Lincs Business networking presentationMalcolm York
 
Lincs & notts business Networking presentation
Lincs & notts business Networking presentation Lincs & notts business Networking presentation
Lincs & notts business Networking presentation Malcolm York
 

Mehr von Malcolm York (13)

Smartworks brochure
Smartworks brochureSmartworks brochure
Smartworks brochure
 
Social media marketing for business
Social media marketing for businessSocial media marketing for business
Social media marketing for business
 
Business continuity
Business continuityBusiness continuity
Business continuity
 
Social media - employer considerations
Social media - employer considerationsSocial media - employer considerations
Social media - employer considerations
 
10 business boosting tips for marketing
10 business boosting tips for marketing10 business boosting tips for marketing
10 business boosting tips for marketing
 
Data can be dynamite
Data can be dynamiteData can be dynamite
Data can be dynamite
 
5 simple seo tweaks,tips and tricks
5 simple seo tweaks,tips and tricks5 simple seo tweaks,tips and tricks
5 simple seo tweaks,tips and tricks
 
Tax planning for sme's
Tax planning for sme'sTax planning for sme's
Tax planning for sme's
 
11 step blogging guide
11 step blogging guide11 step blogging guide
11 step blogging guide
 
Lincs networking final 23 8-2011
Lincs networking final 23 8-2011Lincs networking final 23 8-2011
Lincs networking final 23 8-2011
 
Linked in workshop
Linked in workshopLinked in workshop
Linked in workshop
 
Lincs Business networking presentation
Lincs Business networking presentationLincs Business networking presentation
Lincs Business networking presentation
 
Lincs & notts business Networking presentation
Lincs & notts business Networking presentation Lincs & notts business Networking presentation
Lincs & notts business Networking presentation
 

KĂĽrzlich hochgeladen

A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Trucks in Minnesota
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...amitlee9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚ą5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚ą5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚ą5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚ą5k To 25k Wit...Suhani Kapoor
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 

KĂĽrzlich hochgeladen (20)

A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bang...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow đź’‹ Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚ą5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚ą5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚ą5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚ą5k To 25k Wit...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 

What is malware

  • 1. A presentation given Simon Pell Director Wardour Secure Networks Ltd at the BizGen Conference and Expo Lincoln
  • 2. What is Malware? Are you protected?
  • 3. All the various threats can be called Malware The word malware comes from the combination of Malicious and software. It refers to viruses, worms, spyware, adware, hoaxes etc etc.
  • 4. Did you know that over 90% of small businesses have anti-virus solutions in place? Yet almost half are still getting attacked by e-threats!!
  • 6. A virus is a piece of code or software that is designed to damage your files and programs, they are designed to replicate and spread to other computers via email or across your local area network (LAN).
  • 7. What is a Trojan?
  • 8. What is a Trojan? As the name suggests a trojan is a piece of malicious code disguised as an apparently harmless program, which in many cases when run releases the malicious code hidden in it. Unlike viruses trojans do not self replicate, but like viruses they are designed to destroy files or programs. In many cases they can capture and resend data to external addresses or open the PC to be controlled by remote users, referred to as @cyber-crooks', usually there to steal passwords and banking information. Definitely not what a small business needs.
  • 9. What is a Worm? Worms are programs that make copies of themselves in different places in your PC. The object of this is to slow your PC or network down to make it unusable. Unlike viruses they do not infect files. Worms are usually spread using social engineering, they make them to look attractive by use of attractive names to hide the files. Most popular names relate to sex, famous people, free software anything to make them seem appealing. Worms are more geared to make financial gain and bring notoriety to the creator. Most recently reported in the press was the cornflicker virus.
  • 10. What is a RootKit? These are programs designed to hide objects such as files, windows registry entries or processes. A rootkit itself is not malicious but is used by writers of malware to cover their tracks in infected computers. The first examples of malware using rootkits to hide themselves appeared in 2005. Spyware, Adware and Bots added these characteristics to their own to try to avoid detection.
  • 11. Spyware/Adware Spyware and Adware are programs that display adverts associated with the product or service being offered by the creator of the program. It can be installed in a number of ways, in many cases without the users consent or without knowledge of its function. The term Adware and Spyware can be controversial, as a rule they are not used for criminal intent but to advertise products ad services. information collected does not include bank details but more like web pages visited or favourites etc.
  • 13. What are Cookies Cookies are small text files stored on a computer by your web browser after visiting a web page. The information stored by the cookies has a number of uses. It can be used to personalise a web page for the next time you visit, to collect demographic information about the visitors to the page or to monitor banner clicks. A good example is when you revisit a page and it says "Welcome back <your name>" such as Ebay or Amazon etc. While a cookie in itself is not malicious it could be used by malicious code to affect a users privacy as it can create a users profile of browsing activity and send it to third parties.
  • 14. Summary Virus- Self replicates and infects Trojan – Does NOT Self Replicate and infects Worm – Copies itself to various parts of a computer , DOES NOT infect. Rootkit – Does not replicate and does not itself infect. Cookies – Text File that stores information. Spyware/ Adware – Advertise products to the user based on sites visited.
  • 15. Protection Always use a reliable security program or regime KEEP IT UPTO DATE Don't download content from pages unless you are confident of their reliability. Keep a close eye on all downloads made within your network, as a small business you are liable for the employees use of the internet. Use a good firewall. If you are unsure seek advise and DON'T PANIC!!!
  • 16.
  • 18. Firewalls Watchguard
  • 19. Firewalls are usually hardware devices designed to protect your network from intrusion, unauthorised access and more.
  • 20. FAQ 1.Will it slow my connection to the internet? 2.Can I still access websites? 3.Can I still send and receive emails? 4.Can I still watch YouTube or access facebook/Twitter?
  • 21. Slowness: with the right firewall configuration you shouldn’t notice any change to performance. Websites: can still be accessed but you can control what employees look at. Emails: are still sent and received but you can reduce spam. Social Media: can still be accessed but you can control it better.
  • 22. UTM Suite UTM is unified threat management. Application Control Reputation Enabled Defence WebBlocker SpamBlocker Gateway AntiVirus Intrusion Prevention
  • 24. With XTM application control you can block more than 1800 web and business applications. More precisely you can control access to more than 1800 web and business applications. You can BLOCK, ALLOW and REPORT on who has access to what.
  • 25. How will a firewall benefit a company Reduces time wasted by workers Improved productivity Prevent malware or illegal downloads