FOLLOW US:

© 2018 Trail Blazer Synergy Solutions Group Inc.

I.T Threats

Whether you are banking, shopping, researching, or using social media, the internet is the key to all of our activities daily.  With the wealth of this technological resource, we also have to be aware of the threats to your mobile devices and PC's .   Here are just a few common Internet threats that compromise your data and personal life.

  • Virus: A virus is a malware program that, when executed, attempts to replicate itself and spread to other computer components. Viruses are often disruptive and dangerous, especially in the business environment. They can slow business systems, delete critical data, and much more.

  • Trojan: Also known as a backdoor or “Trojan horse,” a trojan is designed to infiltrate your network and create a reliable way to obtain access to the system in the future. Trojans are often used in conjunction with advanced persistent threats (APT) in an attempt to gather as much information as possible, while remaining hidden from security protocol.

  • Malware: Malware, derived from “malicious software,” is a term used to describe any cyber threat that is intrusive and malicious in nature. This can include any number of online threats, including computer viruses, trojans, ransomware, spyware, and others. Malware is usually activated through the use of executable code or scripts. Basically, anything that has malicious intent can be considered malware.

  • Adware: Adware automatically displays ads on software, particularly web browsers, in an effort to generate revenue for its creator. Adware can often come packaged with free online software, and while it’s not immediately threatening, it can become a severe annoyance and potential security threat. When used as malware, adware can display unwanted (and often embarrassing) advertisements in the form of popups or web ads.

  • Keylogging: A keylogger could be either a software or a hardware that’s designed to capture and record keystrokes. Software versions of keyloggers are often included in viruses or malware packages to capture credentials for later use. The victim is typically unaware that their activities are being monitored.

  • Ransomware: Ransomware is a type of malware that attempts to extort money or credentials from users by locking down local files on their PC or workstation, usually through the use of encryption technology. The user may (or may not) receive the decryption key upon giving in to the hacker’s demands.

  • Phishing: Phishing tactics are used by hackers to lure targets into handing over sensitive credentials, like usernames, passwords, credit card numbers, Social Security numbers, and so on, usually through email spam tactics or other electronic means. Phishing tactics will often masquerade as a trusting or intimidating entity.

  • Spam: Spam is mostly known as the time-wasting emails that users receive on a daily basis. Technically, spam can be any unsolicited or unwanted message sent to your email address. These messages may not seem overtly malicious, but hackers will often use spam to achieve a certain agenda. Spam messages might come with malicious links or attachments, that when clicked on can execute code or send you to compromised websites.