How To Protect Your Small And Medium Sized Business From Security Threats On The Internet
|
|
|
- Daniel Dickerson
- 5 years ago
- Views:
Transcription
1 WEBROOT SOFTWARE A GUIDE TO SECURITY FOR SMALL & MEDIUM BUSINESS Companion Guide to State of Internet Security: Protecting the SMB Full report available at
2 Table of Contents Are You an SMB?... 1 Why the Focus on Internet Security?... 2 Pervasive Internet Use... 2 Home-Based and Remote Workers... 2 Valuable Information... 3 High Infection Rates... 3 Regulatory Requirements... 4 Underestimation of Certain Threats... 4 Budget and Resource Constraints... 5 What are the Risks?... 7 How to Protect Your Company... 9 Tips for Protection Finding the Best Solution Glossary Appendix: Symptoms of a Spyware Infection About Webroot Software... 19
3 Are You an SMB? Small and medium-sized businesses (SMBs) are generally companies with fewer than 1,000 employees, while some groups include companies with up to 5,000 employees in their definition. The U.S. and Canadian governments define small businesses as those with less than 500 employees. Many private sector companies, including some prominent industry analyst firms, such as Forrester, Gartner and IDC, define small businesses as those with fewer than 100 employees. These same firms define mid-size or medium businesses as those with 100 to 999 employees. While the precise definitions vary somewhat, there is global consensus that SMBs are a significant part of the economic landscape. These companies are significant contributors to the world s economies in terms of both revenue generation and employment. According to the U.S. Small Business Administration (SBA), 99.7% of the companies in the U.S. have 500 or less employees, and these companies: Produce half of the private, non-farm gross national product (GNP) Provide half of all private-sector jobs and 45% of the U.S. private payroll According to the Canadian government, businesses with less than 100 employees: Comprise 95% of Canada s 2.2 million business entities Represent roughly a third of the gross domestic product (GDP) Employ about 40% of all working Canadians 1
4 Why the Focus on Internet Security? Small and medium-sized businesses (SMBs) face a complex Internet security landscape that includes: Pervasive Internet use Home-based and remote workers Valuable information Regulatory requirements High infection rates Underestimation of certain threats Budget and resource constraints Pervasive Internet Use Virtually every small and medium-sized business uses the Internet. Wide-spread network access, declining costs of bandwidth and the expanse of Internet resources have made it easier for entrepreneurs and business owners to launch and grow their companies. Network connectivity enables small and medium sized business to more easily: Communicate with customers and suppliers Market their services to a global audience Research product strategies Access Web-based distribution channels, such as Amazon and ebay While the Internet has served as a key driver in the growth and vibrancy of the SMB sector, those network connections also expose SMBs to new security threats. Home-Based and Remote Workers Many SMBs start out or remain home-based businesses. Often these businesses lack information technology expertise and specialized personnel to monitor and maintain security. Internet connectivity also allows employees to work remotely from their homes more easily. SMBs can onboard home-based employees more rapidly and minimize the overhead costs of large office spaces. While working remotely has become the norm in many companies, it is generally more difficult to maintain security on remote PCs. It s common for employees to use unauthorized mobile devices to access sensitive corporate data, or to rely on open, unsecured wireless networks to connect to work. This creates even more routes for malicious software to infect computers and company networks. 2
5 Valuable Information Personal information about customers and employees has a monetary value in the ecosystem of net criminals. Patent notes, trade secrets and other business intellectual property also have monetary values, and thus have a market of would-be criminals. In addition to stealing information that can be easily sold or used in identity theft and similar crimes, many spyware infections also aim to gain control of a PC so that it can be exploited, without the user s knowledge, to distribute adware and spam. Whether distributed via a web site, , instant messaging or some other means, these spyware programs then seek to use the Internet connection as a means to communicate back to the source and/or to download additional spyware onto the computer. High Infection Rates In a recent survey of SMBs based in the U.S. and Canada conducted by Webroot Software, approximately 6 out of 10 respondents reported a virus infection in the past year, in spite of 97% responding that they have an antivirus solution installed. Approximately 7 out of 10 of the SMBs surveyed indicated their business had a spyware infection in the past year. These results only reflect self-reported infections of spyware, and do not include those infections that may have gone undetected. The Anti-Spyware Coalition defines spyware as technologies deployed without appropriate user consent and/or implemented in ways that impair user control over: Material changes that affect their user experience, privacy, or system security; Use of their system resources, including what programs are installed on their computers; and/or Collection, use, and distribution of their personal or other sensitive information. The ongoing misappropriation of system resources and theft of sensitive information make this high rate of spyware infections particularly alarming. Spam Spyware Adware Virus Phishing Trojan Horse System Monitor Keylogger Rootkit Pharming 0% 20% 40% 60% 80% 100% Figure 1 Source: Webroot Software, SMB Survey,
6 Regulatory Requirements Governments in many parts of the world have instituted additional data protection measures to compel companies to adequately protect the sensitive customer data in their possession. For example, the Health Insurance Portability and Accountability Act (HIPAA) legislation requires that the privacy of medical information be adequately protected against unauthorized access and misuse. In the financial sector, the Gramm- Leach-Bliley Act requires that organizations which maintain credit information for customers be held accountable if that data is accessed or compromised by an unauthorized third party. All public companies must comply with Sarbanes-Oxley (SOX) which includes attesting to the risk assessment and audit controls required by the Act. Incidents of unauthorized network access, system monitors and Trojans can bring the authenticity of reporting into question, and will raise concerns of SOX non-compliance. Compliance with these measures can be challenging and expensive for SMBs. However, the potential legal liability and negative publicity for companies that fail to comply can be significantly more costly. Underestimation of Certain Threats In some cases, SMBs may also be underestimating the consequences of certain infections. For example, 85% reported spam attacks, yet less than one third identified those as very or extremely serious. While most would agree spam by itself is more of a nuisance than a serious threat, often spam is a carrier for more serious threats, such as spyware, viruses and worms. Viruses & Worms Spyware Hackers Insider Sabotage or Data Theft Employee Errors Spam 0% 10% 20% 30% 40% 50% 60% Figure 2 Source: Webroot Software, SMB Survey,
7 Spam is cheap for companies. There is almost zero cost associated with mass junk mailings. This makes it an easy and cheap delivery mechanism for malicious attacks. Users who click ads in spam, or even look at a spam in their preview pane, may be at risk of downloading spyware commonly referred to as a drive-by download. A particularly harmful type of spam is phishing. The appearance of these s, and fake sites they link to, are made to look identical to valid, trustworthy companies, however the scam then asks for personal information, such as credit card, bank account, PIN, or Social Security numbers. Figure 3 A 2006 report from ScanSafe indicated that the number of new spyware threats increased by 254% last year while viruses were on the decline. Similarly, over 70% of respondents reported spyware infections while less than half consider spyware to be a very or extremely serious threat. This is particularly concerning. Spyware purveyors are constantly releasing new programs designed to defy detection, resist removal and morph frequently. Unlike viruses, spyware is financially motivated which provides incentive and funds to drive rapid technological innovation and broad distribution. Budget and Resource Constraints SMBs, particularly those with 200 to 5,000 employees, are large enough to attract attention as a target for cyber criminals, yet they may lack the same technical expertise about Internet security issues that is typically found in larger firms. In March 2007, the National Federation of Independent Businesses (NFIB) and Visa USA announced the results of a survey of companies with fewer than 250 employees which found: 61% have never sought information about how to properly handle and store customer information 57% did not see securing customer data as something that requires formal planning 52% keep at least one type of sensitive customer information 39% rely on common sense to keep data safe SMBs have far fewer information technology (IT) staff to support their computer and network needs. In the Webroot SMB Survey, 63.5% of the respondent companies have fewer than 10 people in their IT departments to staff all their IT needs desktop, software and server support as well as to handle Internet security matters. 5
8 These organizations are likely to have remote offices and/or remote workers without any on-site or dedicated IT support or management. Even SMBs with larger, mature IT organizations, often lack a dedicated or centralized security team. None/No IT Dept. 1 to 2 3 to 9 10 to to to % 5% 10% 15% 20% 25% 30% Figure 4 Source: Webroot Software, SMB Survey,
9 What are the Risks? Many large corporations have significantly strengthened their network security infrastructure. Like all criminals, spyware purveyors will concentrate on the easiest marks, making SMBs prime targets. There are many more SMBs than large companies in the world. Most all SMBs hold sensitive personal information about their employees and customers. Yet, SMBs often lack the financial and human resources available at larger companies to combat spyware. Online criminals use sophisticated tools to find unprotected and vulnerable networks and computers. In addition, many of today s online threats are much more difficult to detect and remove unless specialized antispyware software has been installed and configured properly. In contrast to viruses, that typically make their presence known by spreading across many systems simultaneously and seriously impacting machine functionality, the success of spyware programs depends on their stealth nature. Given the significant financial incentives to stealing sensitive data or serving nuisance advertising, spyware program writers are adept at covertly infiltrating a system and installing programs deep within a computer or network. replicates by attaching to files spreads quickly visible damage inconvenient monitors/controls/records keystrokes steals passwords and personal data hidden damage financially motivated In the Webroot survey, the majority of SMBs surveyed indicated spam, spyware, adware and/or virus infection during the past year. Of these, spyware and viruses most threaten to result in the taking or destruction of sensitive information. These infections can have numerous negative business effects including: Loss of sensitive information Slowed system performance Employee downtime Costly computer repairs Legal fees if there is a data breach lawsuit Brand/reputation damage Company closure 7
10 Spam Spyware Adware Virus 0% 20% 40% 60% 80% 100% Figure 5 Source: Webroot Software, SMB Survey, 2007 SMBs that have experienced infections over the past year, shared information about the impacts of those infections on their business. Type of Issue Impact of Infections in the Past Year (n=625) A lot / A great deal Some / A Little Not at all / Don t Know Spyware Viruses Spyware Viruses Spyware Viruses Slowed System Performance 36.6% 27.6% 48.1% 47.2% 15.4% 25.3% Drained IT resources or increased help desk time to repair spyware damage 24.9% 21.5% 52.4% 49.1% 22.7% 29.5% Reduced employee productivity 24.6% 19.9% 55.3% 50.7% 20.0% 29.4% Disrupted business activities 23.4% 18.6% 49.7% 48.4% 26.8% 33.2% Threatened sensitive online transactions Compromised confidential information 14.5% 13.8% 36.1% 32.6% 49.3% 53.6% 12.9% 14.2% 37.2% 32.0% 49.8% 53.7% Caused loss of sales 9.8% 10.7% 30.1% 29.3% 60.2% 60.0% Figure 6 Source: Webroot Software, SMB Survey,
11 How to Protect Your Company For the many SMBs that accept credit card payments, there is strong guidance about best practices provided by the Payment Card Industry (PCI) Data Security Standard. These same guidelines are equally important for all SMBs, even those that do not process credit card payments. The PCI standard states that companies should: Build and maintain a secure network Protect cardholder data Maintain a vulnerability management program Implement strong access control measures Regularly monitor and test networks Maintain an information security policy The PCI standard provides details about how to best fulfill each of these objectives. Specific elements of the standard, such as ensuring that antivirus programs can protect against other forms of malicious code such as spyware and adware, are important guidance for all companies, even those that do not accept credit cards as a form of payment. Central to effectively protecting SMBs are the technological tools to defend against malware and hackers. SMBs need technical tools that provide: Seamless, scalable deployments Centralized, customizable user management, including coverage for laptops and remote employees Assure accurate threat detection that minimizes false positives Delivers comprehensive removal in real-time Advances in technology to provide proactive defenses 9
12 Tips for Protection Webroot is a founding member of the Anti-Spyware Coalition which assembled these tips for protecting networks and mitigating spyware in organizations. Additional information about the Anti-Spyware Coalition can be found at Protect Company PCs from Spyware Maintain up-to-date detection patterns and software updates. Select desktop security software that can be centrally deployed and managed. Maintain current operating system and browser patches to minimize vulnerability to security exploits. Ensure web browsers are set to at least medium in the security and privacy settings. Do not allow users to surf the Internet while logged on with administrator privileges to the network. Maintain a list of allowable software and/or executable files and run a weekly scheduled check against PCs in the network. Check results for non-standard entries and take appropriate actions to remove unapproved programs. Consider re-imaging chronically spyware-infected PCs. Block Spyware at the Gateway Configure gateway proxies and firewalls to prevent: o drive by downloads (non-approved CAB and OCX files). o executable downloads from known spyware sites (identified by content filtering lists). o executable downloads from suspected/high-risk sites (sites in categories with high incidents of spyware) o PC communication to known spyware phone home sites and report which PCs are likely infected with spyware. Scan files at the gateway for known spyware code. Maintain strong anti-spam protection. Educate Employees and Other Network Users Require network users to agree to an Acceptable Use Policy indicating unauthorized programs can be blocked. Teach employees and other computer users to understand that many free programs and services on the Internet install spyware that drastically slows PCs, installs annoying pop ups, and steals private and corporate information. Ensure IT support staff is trained to recognize the less overt spyware symptoms, including very long boot up, slow and erratic application performance and frequent computer crashes so that proper remediation can be taken. 10
13 Finding the Best Solution Freeware is Not Really Free Freeware is a software program that can be downloaded free of charge. While this approach may be tempting to SMBs with tight budgets, the adage, you get what you pay for comes to mind. Typically organizations offering freeware rely on voluntary contributions to create and update their software. These programs lack robust functionality, centralized management capabilities and daily updates all critical to ensuring an effective level of protection. There may also be legal implications for companies relying on freeware. Many of these solutions are intended for individual consumer desktops, and are not intended for deployment on multiple company computers. Often the user agreements reveal that using the software in a corporate environment does require a licensing fee. Firewalls are Only Part of the Solution While gateway protection in the form of firewalls can help to block certain kinds of malicious code, they leave a very significant vulnerability. Spyware is typically embedded in legitimate traffic, such as or on web sites with other valid purposes. Further, once installed on a system most spyware programs disguise themselves as trusted programs, allowing them to communicate freely with the Internet over ports that are often left unprotected by firewalls. Spyware and other malicious programs can infect a computer from a range of entry points including Internet-based applications, peer-to-peer sharing channels and removable media. Regardless of how it arrives, spyware must execute on the desktop or laptop to infect the computer. Thus, to detect, block and remove spyware and prevent damage to the network and other computers in the company, there should be antispyware software on every desktop that is part of an overall, centrallymanaged solution. One Size Does Not Fit All Security software programs that claim to do it all for all kinds of companies can not deliver the specialized expertise needed to address the most serious threats. Spyware in particular is uniquely developed to bury itself in a computer file structure, making it both hard to detect and even harder to remove without causing other damage to the computer. Extensive experience and dedicated research teams are critical to the development of the most effective solution. 11
14 Select a Specially Designed Product to Address the Problem To ensure that SMBs are fully protected, their Internet security solution should include an antispyware program that provides: Regular definition updates Many free antispyware software downloads do not provide adequate protection against spyware programs because they are not supported by ongoing threat updates. This leaves PCs open to attack from newly evolved or introduced malicious spyware programs. Regular updates to your threat database protects you from newly introduced or changed applications, as well as the latest worms and its family of variants. Refined spyware detection Some antispyware software scans yield false positives giving the appearance that they are detecting more traces of spyware than they truly are. Truly useful and beneficial antispyware software only finds and removes true spyware. Proactive protection Detection and removal of spyware programs is only half of the antispyware software solution. It s equally important to stop spyware programs before they reach your computer. Proactive protection prevents spies from installing and defends system and browser elements while simultaneously guarding your information and privacy. Designated threat research team Often, it s not financially possible for companies that offer free antispyware software to house a team of dedicated threat researchers. Updates may be erratic, poorly programmed or non-existent. A threat research team knows what to look for, and how to most effectively find and remove spyware from a user s PC. Customer service Most free antispyware software is not backed by expert customer support, support or online help sections. Dependable companies not only provide software that removes spyware, they also offer customer support resources to help users with any spyware-related issues they encounter. Easy-to-use interface It takes several versions to determine the best and most userfriendly interface. Like research teams, interface improvement is not always an area of focus for providers of free antispyware software. Stable company to back up the software It s important to identify credible antispyware software that is backed by an established company so you have recourse if you encounter a problem with your purchase or software functionality. 12
15 Glossary Adware Adware is advertising-supported software that displays pop-up advertisements. Adware is usually available via free downloads from the Internet. Adware is often bundled with or embedded within freeware, utilitarian programs like filesharing applications, search utilities, information-providing programs (such as clocks, messengers, alerts, weather, and so on), and software such as screensavers, cartoon cursors, backgrounds, sounds, etc. Although seemingly harmless, some adware programs may track your Web surfing habits. Deleting adware may result in the deletion of the bundled freeware application. Antispyware software Antispyware software protects a PC from spyware infection. Spyware protection software will find and remove spyware without system interruption. Botnet A botnet is a collection of computers running remote control software programs and under a common command and control infrastructure via a public or private network. Botnets can be used for sending spam remotely, installing more spyware without consent, and other illicit purposes. Browser Hijackers Sometimes called Home Page Hijackers, browser hijackers have the ability to change your default home page as well as other Web browser settings. Common behavior also includes adding advertising, pornographic, or other unwanted bookmarks, creating pop-up advertisements, and redirecting mistyped or incomplete URLs. Additionally, browser hijackers may redirect your searches to pay-per-search Web sites. Cookie (or Adware Cookie) Cookies are pieces of information that are generated by a Web server and stored on your computer for future access. Cookies were originally implemented to allow you to customize your Web experience. However, some Web sites now issue adware cookies, which allow multiple Web sites to store and access cookies that may contain personal information (surfing habits, usernames and passwords, areas of interest, etc.), and then simultaneously share the information with other Web sites. Adware cookies are installed and accessed without your knowledge or consent, and in some cases this sharing of information allows marketing firms to create a user profile based on your personal information and sell it to other firms. Dialer Dialers have the ability to disconnect your computer from your local Internet provider and reconnect you to the Internet using an expensive pornographic, toll, or international phone number. They do not spy on you, but they have the ability to run in the background, hiding their presence. Dialers may rack up significant long distance phone charges. 13
16 Distributed Denial-of-Service (DDoS) Attack A means of burdening or effectively shutting down a system by bombarding it with an overwhelming amount of traffic. DDoS attacks are often launched using botnets. A vulnerability in one computer system can be exploited to make it the DDoS master. Drive-by download When programs are downloaded without the user s knowledge or consent. Most often accomplished when the user clicks to close or eliminate a random advertisement or other dialogue box. Encryption Encryption is the scrambling of data so it becomes difficult to unscramble and interpret. Exploit/Security Exploit A piece of software that takes advantage of a hole or vulnerability in a user s system to gain unauthorized access to the system. Firewall A firewall prevents computers on a network from communicating directly with external computer systems. A firewall typically consists of a computer that acts as a barrier through which all information passing between the networks and the external systems must travel. The firewall software analyzes information passing between the two and rejects it if it does not conform to pre-configured rules. Firewalls provide effective protection against worm infection, but not against spyware like Trojans, which hide in legitimate applications, then install secretly on a user s PC when the application is launched. Hijackers (Home Page Hijacker or Browser Hijacker) Hijackers have the ability to change your default home page as well as other Web browser settings. Common behavior also includes adding advertising, pornographic, or other unwanted bookmarks, creating pop-up advertisements, and redirecting mistyped or incomplete URLs. Additionally, home page hijackers may redirect your searches to pay-per-search Web sites. Information Privacy The interest an individual has in controlling, or at least significantly influencing, the handling of data about themselves. Host File The host file stores the Internet Protocol address of a device connected to a computer network. Some spyware can change a host file in order to redirect users from a site that they want to visit to sites that the spyware company wants them to visit. 14
17 Keylogger A keylogger is a type of system monitor that has the ability to record all keystrokes on your computer. Therefore, a keylogger can record and log your conversations, chat room conversations, instant messages, and any other typed material. They have the ability to run in the background, hiding their presence. In some cases, a third party may be able to obtain private information such as usernames, passwords, credit card numbers or Social Security numbers. Operating System The operating system is usually the underlying software that enables you to interact with the computer. The operating system controls the computer storage, communications and task management functions. Examples of common operating stems include: MS-DOS, Macintosh, Linux, Windows. Also: OS, DOS. Personally Identifiable Information (PII) Information such as name, address, phone number, credit card information, bank account information, or social security number. Privacy A privacy policy outlines the responsibilities of the organization that is collecting personal information and the rights of the individual who provided the personal information. Typically, this means that an organization will explain why information is being collected, how it will be used, and what steps will be taken to limit improper disclosure. It also means that individuals will be able to obtain their own data and make corrections if necessary. Privacy Policy A firewall prevents computers on a network from communicating directly with external computer systems. A firewall typically consists of a computer that acts as a barrier through which all information passing between the networks and the external systems must travel. The firewall software analyzes information passing between the two and rejects it if it does not conform to pre-configured rules. Firewalls provide effective protection against worm infection, but not against spyware like Trojans, which hide in legitimate applications, then install secretly on a user s PC when the application is launched. Registry A computer registry is a database integrated into certain operating systems which stores information, including user preferences, settings and license information, about hardware and software installed on a user s computer. Spyware often changes registry values in order to take control of parts of the system. These changes can impair the regular function of the computer. 15
18 Remove Me Remove me is an option often included in spam which is fake. That is, if you respond to request removal, you very well may be subjecting yourself to more spam, because by responding, the sender knows that your account is active. A 2002 study performed by the FTC demonstrated that in 63% of the cases where a spam offered a remove me option, responding either did nothing or resulted in more . Rootkit A rootkit is a program that fraudulently gains or maintains administrator level access that may also execute in a manner that prevents detection. Once a program has gained access, it can be used to monitor traffic and keystrokes; create a backdoor into the system for the hacker s use; alter log files; attack other machines on the network; and alter existing system tools to circumvent detection. Rootkit commands replace original system command to run malicious commands chosen by the attacker and to hide the presence of the Rootkit on the system by modifying the results returned by suppressing all evidence of the presence of the Rootkit. Shareware Software distributed for evaluation without cost, but that requires payment to the author for full rights is commonly called shareware. If, after trying the software, you do not intend to use it, you simply delete it. Using unregistered shareware beyond the evaluation period is pirating. Spam Spam is the common name for unsolicited commercial . It is sent, usually in bulk, through open-relays to millions of persons. Spam is cost-shifted advertising. It takes a toll on Internet users time, their resources, and the resources of Internet Service Providers (ISP). Most recently, spammers have begun to send advertisements via text message to cell phones. Spyware Spyware is any application that makes potentially unwanted changes to your computer while collecting information about your computer activities. This information may then be sent to a third party for malicious purposes, without your knowledge or consent. Spyware can be distributed by bundling with freeware or shareware, through or instant messenger, as an ActiveX installation, or by someone with access to your computer. Unlike traditional personalization or session cookies, spyware is difficult to detect, and difficult (if not impossible) for the average user to remove without the use of an effective anti-spyware program. 16
19 System Monitor System monitors have the ability to monitor all computer activity. They range in capabilities and may record some or all of the following: keystrokes, s, chat room conversations, instant messages, Web sites visited, programs run, time spent, and even usernames and passwords. The information is gathered via remote access or sent by , and may then be stored for later retrieval. In some cases, a third party may be able to gain access to private information such as usernames, passwords, credit card numbers or Social Security numbers. Trojan Horse (also known as Trojan or Backdoor Trojan) A Trojan horse is a program that allows a hacker to make changes to a computer without the user s knowledge. Unlike a virus, a Trojan does not replicate itself. It is generally disguised as a harmless software program and distributed as an attachment. Once you open the attachment, the Trojan may install itself on your computer without your knowledge or consent. It has the ability to manage computer files, including creating, deleting, renaming, viewing, or transferring files to or from the computer. It may utilize a program manager that allows a hacker to install, execute, open, or close software programs. The hacker may have the ability to open and close your CD-ROM drive, gain control of your cursor and keyboard, and may even send spam by sending mass s from your infected computer. Trojans have the ability to run in the background, hiding their presence. Virus A program or code that replicates, that is infects another program, boot sector, partition sector or document that supports macros by inserting itself or attaching itself to that medium. Most viruses just replicate, many also do damage. Worm A program that replicates itself over a computer network and usually performs malicious actions, such as using up the computer s resources and possibly shutting the system down. The name is an acronym for write once, read many. Zombie A zombie machine is one that has been taken over using remote control software. Zombies are often used to send spam or to attack remote servers with an overwhelming amount of traffic (a Distributed Denial of Service Attack). A collection of many zombies comprise a botnet. 17
20 Appendix: Symptoms of a Spyware Infection Some common visible symptoms of a spyware infection include: A barrage of unsolicited pop-up ads Browser hijacking so that the website that appears is not the one types in the address bar Sudden or repeated changes to the computer s Internet homepage not made by the user New, unexpected or unrequested toolbars New, unexpected or unknown icons appearing on the desktop or in the tray at the bottom of the screen Problems with keys malfunctioning or not working at all Random error messages Performance degradation with long delays in opening programs or saving files Anti-spyware or anti-virus software is turned off, or malfunctioning Unidentified toll charges on your phone bill It is important to note that often the most dangerous forms of spyware will not display any visible signs, as they are designed to be stealth and remain on the computer unnoticed by the user. 18
21 About Webroot Software Webroot Software, Inc. provides industry leading security software for consumers, enterprises and small and medium-sized businesses worldwide. Webroot security software consistently receives top ratings by respected third party media and has been adopted by millions globally. Webroot Antispyware Corporate Edition (formerly Spy Sweeper Enterprise) is a comprehensive, centrally managed enterprise solution that aggressively blocks, detects and eradicates spyware on desktops across the network. Webroot Antispyware Corporate Edition with Antivirus offers combined protection for spyware and viruses. Webroot products can be found at and on the shelves of leading retailers worldwide. To find out more visit or call All rights reserved. Webroot Software, Inc. Webroot, Spy Sweeper and the Webroot icon are registered trademarks of Webroot Software, Inc. in the United States and other countries. All other trademarks are properties of their respective owners. NO WARRANTY. Information based on research conducted by Webroot Software, Inc. The information is provided AS-IS and Webroot makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained herein is at your own risk. Documentation may include technical or other inaccuracies or typographical errors. Webroot reserves the right to make changes without prior notice. 19
22 th Street Boulder, CO USA Telephone: Fax:
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Spyware: Securing gateway and endpoint against data theft
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
Network Security and the Small Business
Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,
Deter, Detect, Defend
Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Cyber Security Awareness
Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Stopping zombies, botnets and other email- and web-borne threats
Stopping zombies, botnets and other email- and web-borne threats Hijacked computers, or zombies, hide inside networks where they send spam, steal company secrets, and enable other serious crimes. This
Spyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.
Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All
System Administrator Guide
System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
How Spyware and Anti-Spyware Work
22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade
User Guide for the Identity Shield
User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and
Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS
Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: [email protected] Due: Tuesday April 5, 2005
COMPUTER-INTERNET SECURITY. How am I vulnerable?
COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
Spyware and Adware What s in Your Computer?
Spyware and Adware What s in Your Computer? Part 1 Welcome to Part 1 of the online course, Spyware and Adware What s in your computer? Are you being bombarded by advertisements on your computer, has your
E Commerce and Internet Security
E Commerce and Internet Security Zachary Rosen, CFE, CIA President, ACFE Czech Republic Chapter Introduction The Internet has become a global phenomenon reshaping the way we communicate and conduct business.
F-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
Anti-Spyware Coalition Definitions and Supporting Documents
Anti-Spyware Coalition Definitions and Supporting Documents Spyware is increasingly becoming one of the Internet s most prevalent threats. Computer users are looking for ways to regain control over their
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
Remote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Corporate Account Takeover & Information Security Awareness. Customer Training
Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN
Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos
David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review
Introduction to Computer Security Table of Contents
Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...
The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.
The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. Before acting on any ideas presented in this session;
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Protecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Secure Remote Control Security Features for Enterprise Remote Access and Control
Secure Remote Control Security Features for Enterprise Remote Access and Control Good communication is vital to any company, large or small. Many departments within companies are utilizing different platforms
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Computer infiltration
Computer infiltration Computer infiltration means unauthorized entering program code into computer system in order to perform undesired (often concealed) activities. Currently, there are about 80,000 types
Security and Protection in Real-Time
Security and Protection in Real-Time Product White Paper Aug 29, 2006 ParetoLogic Anti-Spyware offers an advanced set of tools designed to protect your computer from spyware threats. There are two lines
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3
CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD
ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document
ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness
TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This
Open an attachment and bring down your network?
Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
