Protect your company from malware

Goldoson, Chameleon and Rorschach. These are not names of villains in the latest James Bond film, but of malicious software, or malware. Have you suddenly lost files, or is your computer not working at all? Chances are malware is the cause. Find out how to protect your business against it.

Cyber Magazine SECURE IT!

Cyber magazine SECURE IT! contains tips and information on how to secure your business online.

Read it

Cybercriminals are constantly inventing new ways to spread malware.  On social media, they spread advertisements with a link to malware, created with AI tools. So never just click on any link. And take measures to keep malware out.

What is malware?

Malware is the collective name for different types of harmful software. The name is a contraction of the 2 words 'malicious' and 'software'. Malware can affect all devices with software. Think laptops, tablets and smartphones. An example of malware is spyware that monitors your computer and steals data. Or ransomware that locks your computer until you pay a ransom to criminals. Criminals regularly attack businesses with malware, causing major damage.

Malware often installs itself on your computer without you noticing.

Unnoticed infection

Malware often installs itself on your computer without you noticing it. For example, when you open an infected attachment in an e-mail. Or if you click a malicious link in a message on social media. Malware can also get onto your computer by visiting a malicious website, sometimes even without clicking anything.

Damage

Hackers use malware to cause as much damage as possible or to make money. For example, they lock your files or shut down your computer network with ransomware. The criminals demand that you pay a ransom. Only then will they give you back access to your files. Criminals also use malware to steal your money and data. Or to misuse your computer as part of a botnet to spread spam or malware to others.

Protect your business

These tips will help you keep malware out.

Secure your devices:

  • Install antivirus software on all your devices. This security software prevents malware infections. And cleans up malware if possible.
  • Install an ad-blocker in your web browser. This ad filter only shows ads on websites you consider trustworthy.
  • Keep all your devices up-to-date and always install security updates right away. Malware often invades your computer through vulnerabilities in outdated software.
  • Make backups regularly. You can then restore files damaged or deleted by malware from a recent backup.

Stay alert:

  • Download and install software only from reliable sources. From well-known software vendors, for example.
  • Only visit websites you trust. From well-known businesses and organisations, for example.
  • Do not just click on a link or an advertisement. For example, in an e-mail you do not trust.
  • Do not just open an attachment of an e-mail or other message you do not trust.

Types of malware

There are several types of malware. Here are the most common ones:

Ransomware

Cybercriminals use ransomware to lock your computer files.  The criminals then threaten to delete your files, unless you pay a ransom. They often demand a ransom in cryptocurrency, like bitcoin, because then they remain anonymous..

Virus

A virus hides in software or in documents, such as text files and images. If you open an infected file, the virus will also infect your other files. It spreads very quickly. A virus can cause damage, for example by deleting files.

Worm malware spreads automatically, so without you clicking on anything.

Worm

A worm is similar to a virus. The difference is that a virus only activates when you perform an action, such as opening a document. A worm replicates and spreads automatically, without you having to click on anything.

Adware

Adware is a combination of ‘advertising’ and ‘malware’. It displays advertisements in pop-up windows on your computer or in advertising banners on websites. Hackers earn money when you click on the advertisements. You may also end up on a malicious website via an advertisement.

Spyware

Spyware steals data from your computer, such as your login details and credit card number. This malware also monitors your computer, for example, what is on your screen and what you type on your keyboard. Cybercriminals sell your data or misuse it for identity fraud.

Trojan horse

This malware pretends to be useful software. If you install this software, it will damage your system. For example, the malware will make your computer part of a botnet. The hacker who controls the botnet will misuse your computer to carry out DDoS attacks or to spread phishing messages, for example.

Remote access Trojan

A Remote Access Trojan (RAT) allows a cybercriminal to take control of your computer without you noticing. The criminal can then issue commands to your computer. For example, they can turn on your webcam and spy on you. Or they can issue instructions that transfer money to their own account.

Recognising an infection

Sometimes it takes a while before you realise that your computer has been infected with malware. However, there are ways to recognise an infection:

  • Your computer is slower than usual, or programmes don't work as well.
  • Your antivirus software has suddenly turned off automatically and you cannot get it back on.
  • In your web browser, you suddenly see ads, toolbars or plug-ins that were not there before.
  • Your computer has software you did not install yourself.
  • You notice that some files are suddenly missing or you cannot open them.
  • You suddenly get a notification on your screen that all your files have been encrypted. And that you have to pay money to get them back.
  • Your anti-virus software notifies you that there is malware on your computer. Beware: this could also be a fake notification enticing you to download malicious software.

Once malware is on your computer, antivirus software may be able to remove it. If this fails, you may need to restore files from your backup. Also, find out what you can do if a hacker locks your files and demands a ransom.

Read more about what you can do after you have been hacked.