Blog | Cyber Security News & Training | Securetain

Malware/Ransomware – How Do I Get Infected by Malware?

SecuRetain team recently completed a 6-part series that guides organizations with leveraging GDPR preparation for CCPA. Here are the links for that series.

Part III – https://www.linkedin.com/posts/charupel_how-do-i-leverage-my-gdpr-preparation-for-activity-6561593578160738304-VCkz/

Part  IV – https://www.linkedin.com/posts/charupel_how-do-i-leverage-my-gdpr-preparation-for-activity-6564159152740974592-EKL9/

Part V – https://www.linkedin.com/posts/charupel_monday-morning-cybersecurity-activity-6566860154967474176-68PZ/

Part VI – https://www.linkedin.com/posts/charupel_how-do-i-leverage-gdpr-preparation-for-ccpa-activity-6569448892113444864-RWk_/

We wish to address the problem faced by small organizations because of Malware/Ransomware.

We will briefly address the do’s and don’ts for organizations to follow. We will also breakdown Malware in four parts.

Malware, or “malicious software,” is an umbrella term that describes any malicious program or code or any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess.

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. Ransomware can be devastating to an individual or an organization. This kind of malware typically locks down your computer and your files and threatens to erase everything unless you pay a ransom. The brief about different types of ransomware:

The next question is “How do I get malware?”

AreaDetails
PeopleMalware attacks would not work without the most important ingredient: you; willing to open up an email attachment you don’t recognize, or to click and install something from an untrustworthy source.
Internet and EmailThe Internet and email are the two most common ways that malware accesses your system.
InternetAnytime you are connected to internet there is risk of malware infection. Any time you download information from internet there is chance of malware infection in absence of anti-malware security software.
Websites,Playing demos of games, downloading infected music file, surfing through hacked websites, install new toolbars from an unfamiliar provider, or opening a malicious email attachment can cause malware to penetrate into your computer systems.
Install or Download programMalicious apps can hide in seemingly legitimate applications, especially when they are downloaded from websites or messages instead of a secure app store.
Permission to Access DataCheck the warning messages when installing applications, especially if they seek permission to access your email or other personal information.
Third Party AppsInstalling mobile apps from unknown third parties. The trusted source for mobile app is downloading app directly from vendors.
Free OffersThe bad actors out there, throw tainted bait at you with an offer for an Internet accelerator, new download manager, hard disk drive cleaner, or an alternative web search service.
Extra ComponentThis extra software, also known as a potentially unwanted program, is often presented as a necessary component, but it often isn’t.
Social EngineeringUse of social engineering to trick you in clicking or installing software or opting for free offers.
Malicious WebsitesIt’s even possible that just visiting a malicious website and viewing an infected page and/or banner ad will result in a drive-by malware download.

RELATED POST:Malware/Ransomware – Different Types of Malware Part II

Malware/Ransomware – How Can I Tell if I Have a Malware Infection? Part III