In-depth

3 ways to protect yourself from the current rise in Trojan attacks

Trojan attacks are on the rise - how can you protect yourself?

There's no way around it, Trojan attacks - malware disguising itself as legitimate software before going on to steal sensitive data and gain backdoor access to the system - are on the rise, and hackers are targeting not just individual users but also businesses, as these threats become ever more sophisticated.

The amount of people who now bank, shop and pay for things online has given rise to more criminals trying to exploit them. For companies this is even more dangerous as, after even a tiny example of human error, sensitive information relating to the entire company could potentially be compromised and data lost forever.

The rise in threats in recent years has had the beneficial side effect of making help and advice for businesses and individuals more widely known and readily available.

If you want a more comprehensive account of the financial threats Trojans can pose to you and your company, you can download Kaspersky's full report here. However, there are a few simple habits and tricks can make the most difference between being left vulnerable to attack and having peace of mind.

Advertisement
Advertisement - Article continues below

Here are three things you should always do to avoid becoming the next victim of a Trojan attack (you can find out more by downloading the full whitepaper here).

Be aware of suspicious links

According to Kaspersky's Financial Cyberthreats in 2016 report (available here), every fourth phishing attempt blocked by its products was related to banking, and the number of users affected with these banking Trojans increased by 30.55% (1,088,900) compared to the previous year. These kinds of attacks are therefore one of the most widespread examples and companies and individual users alike must stay vigilant.

You should know what a bad link looks like when it is sent via email or social media, and make sure everyone else in the company does too. If in doubt, never ever click unknown links sent from someone you haven't have previous communication with, as this can easily lead you to phishing websites.

Often these kinds of messages will direct you to an external webpage alleging more information, or it will claim the user can transfer money from one bank card to another with no minimal fee. To find out more about what these kinds of phishing scams look like, download the full report.

Use a VPN for public Wi-Fi networks

It would be simple if we could always be at home or in the office when dealing with company data, but this isn't the case. Instead, we're prone to setting up at a nearby coffee shop and connecting to unsecure, public wi-fi networks. Hackers know this and can target users through these unreliable connections, so always make sure you're using a VPN to encrypt any data transferred.

There are many affordable VPNs (ranging from $5 to $15 per month) to be found, and most also offer free trials that allow you to find the best solution for your business before you commit fully. It's also likely to be cheaper for companies to pay for long-term subscriptions, rather than month to month.

Get a dedicated security solution for all devices

Even if you're the most careful person in the world, it's always possible that malware could find its way onto your device or network, leading to significant financial losses. That's why it's essential for everyone - especially large organisations or SMBs - to have a dedicated security solution (Find out more about that here) in place across all devices including tablets, mobile and PCs.

Advertisement
Advertisement - Article continues below

The popularity of BYOD and remote working has made this issue more complicated, and security is paramount on personal devices as well as company ones. If you ever work on your own PC, phone or tablet then make sure you're as aware of security on these as you are when in the office. 

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/business/business-strategy/354252/huawei-takes-the-us-trade-sanctions-into-its-own-hands
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/mobile/mobile-phones/354273/pablo-escobars-brother-launches-budget-foldable-phone
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019