1: know your enemy: there are many dangers on the world wide web. Not only concerning you but organizations also! The main source of these dangers are Malware aka Malicious software. It is a type of virus that aims directly at your computer that is meant to steal valuable data or entirely corrupt your device, so let’s learn some versions of malware and how to detect them.
- The virus: the most common type of Malware mostly attached to a document or file that can support macros to execute and spread to your computer. It is designed to tamper with your computer and tamper with operations. They can cause operational issues and data loss. You can mostly prevent it by not downloading any suspicious links from unknown / untrusted sources or just a antivirus would work wonders
- Worms: a type of malware software that rapidly spreads to any device within the network. worms do not need to use host programs to spread. A worm infects a device through a downloaded file or a network connection before it multiplies and spreads at a quick rate. Like viruses, worms can severely disrupt the operations of a device and cause data loss. Antiviruses work for this also!
- Trojan: these are hidden as helpful programs. But once the user downloads it, the Trojan virus can gain access to personal data and then change, block, or just straight up remove the data! This can be extremely harmful to the performance of the device. Unlike normal viruses, Trojan viruses are not designed to self-replicate. A famous Virus is the “you are an idiot Trojan” whenever you tried to close it, it would instead pop up with a message stating that “you are an idiot”
- Ransomware: A type of malware that gains access to sensitive information within a system, encodes that information so that the user cannot access it, and then demands a financial payout for the data to be released. Ransomware is commonly part of a phishing scam. By clicking a disguised link, the user downloads the ransomware. You can mostly prevent it by not downloading any suspicious links from unknown / untrusted sources
- Spyware: Not only is there a spy in our base there is one on our computer also! Spyware is malicious software that runs secretly on a computer and reports back to a remote user. Rather than simply disrupting a device’s operations, spyware targets sensitive information and can grant remote access to predators. Spyware is often used to steal financial or personal information.
2:know yourself!: Processes, systems and functions can be exploited by viruses and general malware but how can it be exploited and how can it be used against you? Let’s go over them.
- Email: Viruses can get into your computers through emails using suspicious links and files sent through unscrupulous means when you open an attachment or click a link contained in an email message. If your email client allows scripting, then it is possible to get a virus by simply opening a message. It’s best to limit what HTML is available in your email messages.
- Gaming: Viruses can also get in though out of date software it is one of the main entry points for malware. That’s how malicious programs can find their way into your system. Gamers tend to have many helping programs and apps installed meaning that they will have a higher chance of getting malware. Just make sure to trust the websites you download things from
- Word processing: Yes, it is possible to get a virus by simply opening an infected Word file. Viruses can be embedded within the document or exploit vulnerabilities in the word processing software to execute malicious code. Just make sure to trust the documents that you open and you should be fine
- Video editors: While a video file itself isn’t typically considered a direct carrier of a virus, malware can potentially be embedded within a seemingly normal video file, allowing it to infect a computer when the video is opened in a vulnerable video editing software especially if the user downloads the video from an untrusted source. So just make sure to trust the website like everything else!
- Website: Visiting infected websites can expose your computer to viruses. These websites may contain malicious code, such as JavaScript, that can exploit vulnerabilities in your web browser or operating system. Also this can occur when malicious code is automatically downloaded to your computer without your knowledge or consent.
3: Develop your strategy: so how do we stop these malware from getting into our computers? Let me recommend some ways that you could prevent malware
- Keep Your Software Up-to-Date: Keep updating often because they include security patches that address issues that malware can exploit. Ensure your operating system, antivirus software, and other applications are always running the latest versions.
- Use a Reputable Antivirus Software: A good antivirus program can detect and remove most of the malware before it causes damage. Choose a reputable antivirus software and keep it updated. Just to be safe
- Be Cautious of Suspicious Emails and Links: Avoid clicking on links or opening attachments from untrustworthy sources. And be wary of suspicious emails
- Verify Website Authenticity: Check trustworthiness before entering personal information, and make sure that you’re on a legitimate website. Look for signs of a secure connection and verify the website’s URL.
- Use Strong, Unique Passwords: Avoid using the same password for multiple accounts. Create strong passwords with a combination of uppercase and lowercase letters, numbers, and symbols. Consider using a password manager to help you manage your passwords securely. So that if you pick up a ransomware it can only be one single password that is held for ransom hopefully