Personal Protection Against the Trojan Horse

One of the best ways to protect yourself or your company against the virus is to educate your employees or yourself.  Viruses can be harmful to a business for many reasons.  A recent estimate states the worldwide impact of viruses on businesses to be at 17.1 billion dollars.  An average virus attack to a business costs them $10,000.  There is also an estimate that a business can lose up to 50 hours of productivity while trying to fix it. So educating employees is very important.

One of the biggest ways a Trojan Horse can attack is through email.  Knowing what to look is paramount to protection.  Trojan Horse virus will look like an ordinary email.  They usually attack through an attachment in the email.  It is important to teach your employees not to open any unknown attachments.  The picture below shows an example of what a Trojan Horse email might look for.

trojan

Hackers will make the email seem that it is very important that you open it.  This message says urgent court notice.  Other email attachments I have seen are bill notices, ecards, or bank notices.  It is vital that you not open the attachment without letting your virus protection software to check it first.

Hackers are finding new and creative ways to hide the virus.  One such example is using Facebook.  A Trojan Horse virus named ZeuS recently made its way onto Facebook.  It would post a video on your wall or into a message to you.  Once you click to view the video the virus would download onto your computer.  It will find your bank information and steal it.  This virus can be protected through any antivirus software.

Businesses are starting to be proactive when it comes to educating their employees.  Some things they are doing include training employees many times to stay up to date with the newest threats.   Businesses are also trying to make the process easier by creating applications that tell the user when to change their password.

Sources:

“Avast! Blog » Phishing.” Avast! Blog » Phishing. N.p., n.d. Web. 22 Apr. 2014. <https://blog.avast.com/tag/phishing/>.

“Malicious Software: Viruses, Worms, and Trojan Horses.” Home. N.p., n.d. Web. 22 Apr. 2014. <http://www.npdn.org/infosec_sw_malware>.

 

Leave a Reply