Increase Your IQ: Malware

Increase Your IQ: Malware

As Anthony mentioned in the video, the most common type of malware is a virus. Viruses can be transmitted through email attachments, USB/Flash drives or by clicking on bad links on websites. Whenever you receive a document through email, you should message the sender through a secure channel to confirm they sent it.

An installed antivirus program on your computer does not mean you are 100% protected from all the cyber threats. Fluid Networks employs a multifaceted solution to protect systems, which includes Antivirus, Firewall and Workstation lockdown. Because antivirus software is less than 100% effective, viruses, especially brand new ones, may be able to bypass some or all of these tools. The onus is on the user to remain alert and identify suspicious emails and websites. If you are ever unsure, don’t take a chance, open a ticket or give Fluid Networks a call to help you take a quick look!


Is Mobile Malware Playing Hide and Steal on Your Device?

As hackers continue to target consumers through the channels, they spend the most time on – their mobile devices – it’s important for users to reflect on the current digital landscape to help protect their data, as well as their family and friends. Check out this article with security tips to defend against stealthy mobile threats
https://www.mcafee.com/blogs/consumer/mobile-threat-report-q1-2020/?hilite=%27malware%27&web_view=true


Malware from illegal video streaming apps: What to know

Check out this article describing how pirated video streaming apps may infect your system or mobile device with malware:

https://www.consumer.ftc.gov/blog/2019/05/malware-illegal-video-streaming-apps-what-know


USB threats from malware to miners

USB devices appeal to attackers targeting computer networks not connected to the internet. Check out this article to find out how USBs may transmit malware: https://securelist.com/usb-threats-from-malware-to-miners/87989/


Tuesday Training… "Physical Security"

Anthony and his pal, Harold, talk physical security. Why do you secure everything (even the printer), and what could someone get by sneaking in? Here’s how not to leave security out in the cold.