12 Days of Cyber –What Is Malware and How to Defend Against It
Malware comes in many forms and is one of the biggest cyber security threats in the world today due to the relative ease in which it is spread.
What is Malware?
The name Malware stands for malicious software and is defined as software designed to gain access to a devices systems, disrupt the devices operation or gather sensitive data. There are many diffeFrent forms of Malware ranging from spyware, adware, ransomware, Trojans, worms and others.
The first recorded incident of Malware occurred in 1989 with the ‘AIDS’ Trojan. The Trojan would prevent a user accessing their computer by claiming that the user’s license to use a certain piece of software had expired. It also encrypted files on the hard drive and demanded that the user pay $189 for the means to unlock it.
How is Malware spread?
The most common way Malware infects a device is by coming in via emails as a media link or attachment. Clicking on links on some websites can also allow malware to infect a device. The best defence against Malware is education. PGI Cyber’s Cyber Security Awareness (CSA) course teaches attendees how to avoid Malware and what to look out for. Once people know what to avoid, the threat posed by Malware can be reduced.
How to Defend Against Malware?
Your free Global Geopolitical Dashboard
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Weekly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.