Tuesday, 26 August 2008

Malware Unlimited - Understanding the Scope of the Threat

As the number and severity of software-borne threats to companies continues to grow, the bottom line risks of compromised confidential data increase as well. Earlier generations of computer viruses are giving way to much more insidious threats collectively known as malware and raising the risks to brand integrity across all sectors.

This malicious software - literally, bad code - can expose any organization of any size to huge financial liabilities. Ignoring the risk is not an option. Failure to do so could permanently damage your company's brand and impact the bottom line.

Like most technologies, malware can take on a number of forms, including:

• Worm - A type of virus that self-replicates and consequently spreads very quickly. Although worms on their own are not destructive, they can compromise network performance and security when combined with destructive payloads

• Trojan. A program that claims to be one thing, but is in fact another. For example, a Trojan could look like a document or file attachment which, when downloaded, installs a virus

• Spyware - Software which quietly collects personal information and uses the results to affect system performance, redirect revenue-generating traffic or render the machine vulnerable to additional infection. Sometimes called a tracking cookie

• Keystroke logger - Perhaps the most insidious threat of all, as it captures keystrokes like user names and passwords and sends them to the individuals who originally wrote the code. Also known as keyloggers, these are often used for identity theft

Adware is another form of unwelcome software. Typically installed in the background when employees visit questionable Web sites or open up infected files, adware is used by marketers to learn end-user habits and help them target future online ads. Even if the intent is not criminal, adware resides in a gray area and its presence can still compromise security and reduce performance.

In any form, malware can rapidly damage your company and your brand. Left unchecked, it can put confidential organizational and client data into the wrong hands. Aside from the massive financial liabilities associated with a privacy breach, the resulting publicity could permanently damage the organization's brand identity. As improbable as it may initially seem, one malware incursion could quite literally ruin the company. Protection is a critical priority.

At the very least, anti-virus and anti-spyware software must be installed on every desktop and laptop machine, as well as on the corporate network. Processes must be in place to install updated signature files across all network devices as they become available. IT staff must prioritize their anti-malware activities, and staff must be trained in behaviours that minimize the organization's exposure.

Finally, acceptable use policies that restrict users from activities most likely to lead to malware infection - downloading unsanctioned software, for example - must be drawn up. As threatening as malware is to the future of the company, encouraging the right kind of behaviour can go a long way toward reducing the risk.

By : Kevin Joy

To find out more information on protecting your company's brand and online reputation, to request a free demo, or to contact Kevin Joy, please visit http://www.brandprotect.com

For free online reputation management resources, including podcasts, whitepapers and casestudies, please go to http://www.brandprotect.com/online-brand-protection-resources.html


Article Source: http://EzineArticles.com/?expert=Kevin_Joy

 
Copyright © . Information and Technology Articles - Posts · Comments
Theme Template by BTDesigner · Powered by Blogger