SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Roswell• GA • (770) 993-5428
www.TeamLogicIT.com/RoswellGA
The TeamLogic IT difference
Your Technology Advisor
TeamLogic IT difference …
We are Technology Advisors
Our mission is to make the
technology used by Small and
Medium businesses BE their
competitive advantage
What is malware
Malicious + software
Software that is designed to do bad
things
Includes: Viruses, Worms, Bots,
Zombies, Trojan Horses, Rootkits,
Spyware, Keyloggers, Scareware,
Ransomware and more!
Viruses and Worms: the Contagious Threat
Spread without users knowledge
Infected DVD/CDs, thumbdrives, etc.
Spread by running a program
Designed to do damage!
Can be proactively stopped with good
antivirus software
Bots and Zombies: the Captive Threat
Infected by running a program
Bots make PCs deliver illegal data
Zombies create DDoS attackers
Designed to do no harm to host
Detection only after user notices
problem
Trojan Horses and Rootkits: the Masked Threat
Designed to be hidden while attacking
Trojan Horses bring in bad malware
Rootkits is a masking technique that
prevents detection and removal
Designed to trick you into a purchase
Detection only by frequent scanning
Spyware and Keyloggers: the Financial Threat
Designed to steal IDs and passwords
Spyware tracks visits and actioins.
Might tie into webcam
Keyloggers will copy keystrokes to
steal passwords or account numbers
Designed to steal your identity
Detection after data has been stolen
Scareware and Ransomware: the Existential Threat
Designed to extort money with threat of
destruction of data
Scareware=threat. Ransomware’s=real.
Triggered by running a program when
opening a email attachment
Quick action can mitigate damage.
Might have to pay ransom of ~$400!
Self-help limitations
Steps assume light infection of nuisance malware.
Go to a professional if any of the following:
Scareware or Ransomeware
Conduit malware – lots of demanding popups
So many popups that you can’t do work.
Excess usage or activity
Identity theft
You don’t have 6-10 hours to work on problem.
Generic Steps to Disinfection
Remove unknown and unwanted programs
Use Antivirus and Antimalware to clean
Remove unknown and unwanted add-ons and
configurations from all browsers
Remove extraneous files from system
Update system, utilities, programs
Put process in place to proactively protect
Removing Programs
Open Control Panel and select Uninstall
Programs. Remove unknown programs
Tricks and tips
Sort by date. Pay attention to newer installs
and clusters
Sort by publisher.
User Internet to learn about publishers and
programs
Remove toolbars and unneeded programs
Reboot whenever requested
Antivirus and Antimalware programs
Install good AV and AM
You can only have ONE Antivirus program installed
Replace MSE or Defender
Replace expired pro versions
Avira and Bitdefender are decent free AV programs
MalwareBytes and Spybot Search and Destroy are
decent Antimalware programs
Update programs, immunize, setup schedules
Run AV and AM programs
Run one at a time
Fix all issues
Reboot as requested
Run additional times until clean
Clean ALL Browsers
Depending on browser, click on configuration,
settings or Internet Options
Reset opening page
Remove all search engines except for one.
Review add-ons and extensions.
Reset security options to default
Reset Pop-up blocker
Remove temporary files
Remove cookies
Remove extraneous files
Remove temporary files
Remove unused programs
Use Disk Cleanup (Windows Program)
Run on each hard drive
Check each option
Use CCleaner from Piroform
Run Cleaner to remove files
Run Registry to fix issues
Update System
Update Windows
Important and Optional
Include Microsoft Office
Update Java
Go to Java.com
Might have to repeat with each browser
Set to check monthly
Update Adobe Reader
Go to Adobe.com
Set to check monthly
Proactive Protection
Check Microsoft Updates
Check on Wednesday or Thursday
Most updates released Tuesday night
Run Ccleaner and/or Disk Cleanup
Run monthly
Run after software updates, installs or removal
Verify AV is running automatically
Check every other week
Check AV logs
Scan for Malware
Weekly
Proactive Protection – great ideas
Backups
Verify that backups are working
Try to restore a file from previous day
Check cooling fans
If dusty, turn off computer, unplug and blow out dust
Remove unneeded cables
Keep area neat. Curl up extra cable lengths
Check for frayed or pinched cables.
Replace old Backup Batteries (UPS)
S–H out of IT .
We take the
Roswell • GA • (770) 993-5428
www.TeamLogicIT.com/RoswellGA

Weitere ähnliche Inhalte

Was ist angesagt?

avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
HayWhitfield72
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
makanaya
 
so big 22
so big 22so big 22
so big 22
cainem
 
so big
so bigso big
so big
cainem
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
JamesBennett15
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
samthking25
 

Was ist angesagt? (18)

'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For Managers
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
How to fix Bitdefender threat scanner error Message
How to fix Bitdefender threat scanner error MessageHow to fix Bitdefender threat scanner error Message
How to fix Bitdefender threat scanner error Message
 
Sowmya
SowmyaSowmya
Sowmya
 
T3 conference talk nov 2014
T3 conference talk nov 2014T3 conference talk nov 2014
T3 conference talk nov 2014
 
so big 22
so big 22so big 22
so big 22
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
so big
so bigso big
so big
 
Antiviruses and how they work
Antiviruses and how they workAntiviruses and how they work
Antiviruses and how they work
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Malware
MalwareMalware
Malware
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 

Andere mochten auch

Andere mochten auch (8)

Microsoft Powerpoint Presentation
Microsoft Powerpoint PresentationMicrosoft Powerpoint Presentation
Microsoft Powerpoint Presentation
 
Portafolio 743-8
Portafolio 743-8Portafolio 743-8
Portafolio 743-8
 
Probando
ProbandoProbando
Probando
 
337 equipo 7 bloque 1
337 equipo 7 bloque 1337 equipo 7 bloque 1
337 equipo 7 bloque 1
 
RP Demostrando E.
RP Demostrando E.RP Demostrando E.
RP Demostrando E.
 
Trabajo Del Tema 8
Trabajo Del Tema 8Trabajo Del Tema 8
Trabajo Del Tema 8
 
Utpl - Computacion - Freddy Mercury
Utpl - Computacion - Freddy MercuryUtpl - Computacion - Freddy Mercury
Utpl - Computacion - Freddy Mercury
 
Sistemas operativos
Sistemas operativosSistemas operativos
Sistemas operativos
 

Ähnlich wie Malware 10 minute presentation

Efective computing
Efective computingEfective computing
Efective computing
Naveen Sihag
 
Efective computing
Efective computingEfective computing
Efective computing
Naveen Sihag
 

Ähnlich wie Malware 10 minute presentation (20)

List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus
AntivirusAntivirus
Antivirus
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
 
Antivirus
AntivirusAntivirus
Antivirus
 
Spyware
SpywareSpyware
Spyware
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Efective computing
Efective computingEfective computing
Efective computing
 
Efective computing
Efective computingEfective computing
Efective computing
 
Malware and careless computing
Malware and careless computingMalware and careless computing
Malware and careless computing
 
Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!Advanced System Protector-Protect your PC against Malware Threats!
Advanced System Protector-Protect your PC against Malware Threats!
 
How To Uninstall Masksearch.com
How To Uninstall Masksearch.comHow To Uninstall Masksearch.com
How To Uninstall Masksearch.com
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Malware 10 minute presentation

  • 1. Roswell• GA • (770) 993-5428 www.TeamLogicIT.com/RoswellGA The TeamLogic IT difference Your Technology Advisor
  • 2. TeamLogic IT difference … We are Technology Advisors Our mission is to make the technology used by Small and Medium businesses BE their competitive advantage
  • 3. What is malware Malicious + software Software that is designed to do bad things Includes: Viruses, Worms, Bots, Zombies, Trojan Horses, Rootkits, Spyware, Keyloggers, Scareware, Ransomware and more!
  • 4. Viruses and Worms: the Contagious Threat Spread without users knowledge Infected DVD/CDs, thumbdrives, etc. Spread by running a program Designed to do damage! Can be proactively stopped with good antivirus software
  • 5. Bots and Zombies: the Captive Threat Infected by running a program Bots make PCs deliver illegal data Zombies create DDoS attackers Designed to do no harm to host Detection only after user notices problem
  • 6. Trojan Horses and Rootkits: the Masked Threat Designed to be hidden while attacking Trojan Horses bring in bad malware Rootkits is a masking technique that prevents detection and removal Designed to trick you into a purchase Detection only by frequent scanning
  • 7. Spyware and Keyloggers: the Financial Threat Designed to steal IDs and passwords Spyware tracks visits and actioins. Might tie into webcam Keyloggers will copy keystrokes to steal passwords or account numbers Designed to steal your identity Detection after data has been stolen
  • 8. Scareware and Ransomware: the Existential Threat Designed to extort money with threat of destruction of data Scareware=threat. Ransomware’s=real. Triggered by running a program when opening a email attachment Quick action can mitigate damage. Might have to pay ransom of ~$400!
  • 9. Self-help limitations Steps assume light infection of nuisance malware. Go to a professional if any of the following: Scareware or Ransomeware Conduit malware – lots of demanding popups So many popups that you can’t do work. Excess usage or activity Identity theft You don’t have 6-10 hours to work on problem.
  • 10. Generic Steps to Disinfection Remove unknown and unwanted programs Use Antivirus and Antimalware to clean Remove unknown and unwanted add-ons and configurations from all browsers Remove extraneous files from system Update system, utilities, programs Put process in place to proactively protect
  • 11. Removing Programs Open Control Panel and select Uninstall Programs. Remove unknown programs Tricks and tips Sort by date. Pay attention to newer installs and clusters Sort by publisher. User Internet to learn about publishers and programs Remove toolbars and unneeded programs Reboot whenever requested
  • 12. Antivirus and Antimalware programs Install good AV and AM You can only have ONE Antivirus program installed Replace MSE or Defender Replace expired pro versions Avira and Bitdefender are decent free AV programs MalwareBytes and Spybot Search and Destroy are decent Antimalware programs Update programs, immunize, setup schedules Run AV and AM programs Run one at a time Fix all issues Reboot as requested Run additional times until clean
  • 13. Clean ALL Browsers Depending on browser, click on configuration, settings or Internet Options Reset opening page Remove all search engines except for one. Review add-ons and extensions. Reset security options to default Reset Pop-up blocker Remove temporary files Remove cookies
  • 14. Remove extraneous files Remove temporary files Remove unused programs Use Disk Cleanup (Windows Program) Run on each hard drive Check each option Use CCleaner from Piroform Run Cleaner to remove files Run Registry to fix issues
  • 15. Update System Update Windows Important and Optional Include Microsoft Office Update Java Go to Java.com Might have to repeat with each browser Set to check monthly Update Adobe Reader Go to Adobe.com Set to check monthly
  • 16. Proactive Protection Check Microsoft Updates Check on Wednesday or Thursday Most updates released Tuesday night Run Ccleaner and/or Disk Cleanup Run monthly Run after software updates, installs or removal Verify AV is running automatically Check every other week Check AV logs Scan for Malware Weekly
  • 17. Proactive Protection – great ideas Backups Verify that backups are working Try to restore a file from previous day Check cooling fans If dusty, turn off computer, unplug and blow out dust Remove unneeded cables Keep area neat. Curl up extra cable lengths Check for frayed or pinched cables. Replace old Backup Batteries (UPS)
  • 18.
  • 19.
  • 20. S–H out of IT . We take the
  • 21. Roswell • GA • (770) 993-5428 www.TeamLogicIT.com/RoswellGA