Cybersecurity and Fraud Protection
How should you protect yourself from malware?
Malware is software that is hostile or intrusive and aims to steal, manipulate or corrupt data. Once installed, the cyber-criminal may use the malware to monitor user habits, collect credentials and data, and modify/create payments. Malware can disrupt businesses, grow into other fraud schemes and even initiate unauthorized payments. Take the quiz below to learn how to spot malware tactics and build your knowledge to stop these fraud schemes in their tracks.
Examples Of Malware:
- Virus - Malware that is capable of copying itself and spreading to other computers to steal information or harm host computers, typically by attaching themselves to various programs.
- Spyware - Malware that spreads typically by combining itself with legitimate software and spying on a user’s activity without their knowledge.
- Trojan Horse - Malware that is downloaded to the user’s computer typically by disguising itself as a normal file, but can take control of your computer. It is designed to steal data, modify files, monitor user activity, provide remote access or perform some other harmful action on your data, computer or network.
- Ransomware - Malware that is designed to block access to a computer system or data until a ransom is paid. Ransomware normally employs other malware to gain needed access and privileges to a computer system or network before it is deployed.
Test your Knowledge: True or False
A: True, cyber criminals use multiple outlets to monetize stolen data and credentials
A: True, malware can be spread through browsing websites, downloading items, clicking on email links, etc.
A: True, a trojan horse is downloaded on one’s computer and disguises itself as a normal file to steal data, modify files, monitor activity or perform some other harmful action.
Examples of malware risks:
- Criminals will use information to initiate unauthorized payments
- Criminals may combine stolen information with other information harvested via financial malware to pivot and pursue a variety of other fraud schemes
Examples of how malware can get placed:
- Phishing emails that trick a user into opening a link or file
- Web browsing sites infected with malware
- Software that has vulnerabilities which allows malware to be installed
- Using stolen credentials to gain remote access to one’s network
Examples of how one can prevent malware:
- Ensuring all antivirus software is up to date
- Blocking access to suspicious sites
- Disabling auto-run of macros when opening documents
The material contained in this presentation is intended as general cybersecurity awareness. It does not provide a comprehensive list of all types of cyberfraud activities or identify all types of cybersecurity best practices. Any recommendations made during the presentation are not guaranteed to be accurate or complete. The audience member is responsible for determining how to best protect against cyberfraud activities and for selecting the cybersecurity best practices that are most appropriate for his or her needs.