Malware protection

Advanced security from threats
while browsing the internet

The growth of threats

The word malware, a contraction of the English term “malicious software,” has entered common speech to refer to any computer program that is spread with the intent to harm a user or a networked resource.  From the days before 1992, when the term “virus” came into use, to the present day, the types of malware have multiplied in step with IT evolution, so it is truly foolish to underestimate the problem. 

According to the latest statistics, more than ninety percent of enterprises are vulnerable, and ransomware, i.e., hacker attacks with extortion, confirm that they are the most dangerous, with total payments in excess of $20 billion and estimated to grow by tenfold over the next ten years. 

The average cost for affected, medium to large businesses exceeds $1 million, on top of which damage from data loss must be added, since only half of the victims fully recover their backups.

Risks and vulnerabilities

Today, ordinary people are aware that malware is a major threat, but they underestimate the fact that they could be victims or accomplices of hackers, so they often avoid or remove protections from personal devices, considering them an unnecessary hindrance to browsing. 

The same users, however, then connect remotely to the corporate network, and, if their devices are infected, may, unknowingly, open a door to potential hackers, creating a security hole.  The difficulties for modern cyber security stem mainly from the ever-increasing number of new malware and types of attacks, but, at the same time, also from the proliferation of unprotected connections and devices.  For this reason, antivirus and perimeter security systems are no longer enough.

Malicious urls are constantly changing; malware is increasingly difficult to identify; and connection devices, which need to be kept safe with up-to-date equipment, are often in excessive numbers.  What is needed, therefore, is the best intelligence that intervenes beforehand, preventing access to sources of danger on the Web.

“42% of personal computers were vulnerable to malware”

Avoidable dangers

  • Typosquatting

    Deceptive sites that take advantage of assonances and errors in typing a name

  • Keylogger

    Programs that track keyboard movement to deduce passwords and credentials.

  • Fileless malware

    Direct in-memory infection that runs codes and extracts data without installation.

  • Worm

    Self-replicating virus with the purpose of infecting other computers by duplicating itself and remaining active.

  • Botnet

    Remote control that makes serial operations, such as spam spreading, viruses, or DDOS attacks.

  • Trojan

    Misleading program that pretends to be legitimate in order to provide access to a system.

  • Rat

    Remote access Trojan for remotely controlling the victim’s device.

  • Malvertising

    Malware included in an ad on legitimate websites.

  • Phishing

    A series of deceptive procedures for obtaining credentials or installing malicious programs.

  • DDOS attacks

    Automated requests concentrated over time in order to crash a site.

  • Ransomware

    Attacks aimed at crippling the organization’s IT in order to later demand ransoms.

  • Rootkit

    Backdoor program that masks the existence of software and takes complete control.

  • Spyware

    Program that spies on browsing habits in order to obtain credentials.

  • Adware

    Program that collects browsing data in order to formulate tailored advertisements.

Other features