253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Test Your Knowledge of These 3 Common Security Threats

Test Your Knowledge of These 3 Common Security Threats

Security is a critical part of running your business, especially in a world where organizations require technology for most any task. In fact, some of the most dangerous threats are known to hide within a company’s network, waiting for any opportunity to strike. With the right preventative measures, you can keep your network safe from catching threats before they hit your network in the first place.

Defining Malware
Malware is short for “malicious software,” which is an overarching phrase referring to malicious code designed to cause problems. Malware often injects code into applications to execute viruses or trojans. One of the most common types of malware is a variant called ransomware, which you’ve probably heard of thanks to a number of high-profile infections. When a machine is infected with ransomware, it encrypts the files on the device until the ransom is paid to the hacker. Aside from this rather dangerous strain, other types of malware can have far-reaching and varied effects.

Defining Rootkits
Like malware, a rootkit is at home on a system. Unlike some types of malware, however, a rootkit is designed to allow a hacker to gain control of a system while remaining undetected for extended periods of time. Rootkits are dangerous thanks to their ability to avoid detection by software that’s supposed to find them, like firewalls and antivirus solutions.

Defining Trojans
Trojans are malicious entities that allow hackers to access a system by misleading the user. Trojans are backdoors that can allow hackers access to a system at a later date, and they are often installed alongside other malware to distract the user from taking preventive action. The trojan can be used for a number of purposes, from data destruction to surveillance or espionage.

The Solution: Preventative Security Measures
Since so many threats are blocked by preventative security measures, it would be foolish not to implement them. There are several ways you can keep threats out of your system, including:

  • Firewall: Firewalls act as a bouncer for your network, keeping threats from entering or leaving your infrastructure. They work best when combined with other preventative measures, like antivirus, content filters, and spam blockers.
  • Antivirus: Antivirus solutions detect and eliminate threats that have made it past your firewall solution. Antivirus offers prompt threat detection, which is important since malware that’s left unchecked could cause untold troubles.
  • Spam blocker: Threats often arrive in your email inbox as spam, and the unknowing employee could accidentally click a malicious link or reveal important credentials. A spam blocker eliminates the vast majority of spam from even hitting your inbox.
  • Content filter: A content filter is helpful for keeping your employees from accessing sites known to host malware, as well as inappropriate or time-wasting sites, like social media.

A Unified Threat Management (UTM) solution is a great way to take advantage of all of the above solutions. It’s widely considered to be the most comprehensive and useful preventative measure available to SMBs. If you want to learn more about UTMs, be sure to give Graemouse Technologies a call at 253.777.0763.

Educate Yourself About the Cloud Before Choosing a...
Tip of the Week: How to Clean Your PC Like an IT P...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 25 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Innovation Small Business Business Computing Alert Backup Google Efficiency Malware Microsoft Software Smartphones Hardware Managed IT Services Ransomware Hackers Social Media Internet Cybercrime Data Breach Server Law Enforcement Windows 10 Social Engineering Saving Money App Email Computers Productivity Operating System Private Cloud Business Management Hosted Solutions Public Cloud How To Google Drive Data Windows 10s Business Continuity The Internet of Things Data Backup Money Chrome Browser Phishing Employer-Employee Relationship Passwords Data Security Router Vulnerability Government Outsourced IT Upgrade Data loss User Error Miscellaneous webinar Marketing HBO Solid State Drive Managed IT Services Screen Mirroring Bandwidth Wi-Fi Conferencing Office Network Security Audit Quick Tips Collaboration Computer Cast Internet Exlporer Networking Emails Relocation Facebook Computer Fan Apple Bring Your Own Device IBM Data Storage End of Support Supercomputer Productivity Netflix Humor FENG iPhone Telephone Systems Spam IT Management Internet exploMicrosoft BDR Flexibility IT Support Windows 10 Budget IT Plan Advertising Current Events Windows User Tips OneNote Automation Save Money Knowledge Managed Service Provider Unsupported Software Android Settings Downtime Health Business Network Congestion Gadgets Software Tips Root Cause Analysis Files Cybersecurity Mobile Device Management IT Consultant BYOD Hybrid Cloud Spam Blocking Meetings History Samsung Safety Leadership Hiring/Firing Physical Security Network

Blog Archive

Newsletter Sign Up