{"id":2264,"date":"2013-04-22T18:00:47","date_gmt":"2013-04-23T01:00:47","guid":{"rendered":"http:\/\/clikcloud.net\/dna\/what-is-malware-and-why-should-i-care\/"},"modified":"2013-04-22T18:00:47","modified_gmt":"2013-04-23T01:00:47","slug":"what-is-malware-and-why-should-i-care","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/","title":{"rendered":"What is Malware and Why Should I Care?"},"content":{"rendered":"<p dir=\"ltr\">Malicious Software or Malware is a serious concern to IT Security experts and business owners alike. \u00a0Malware is a category of Cyber Security threats that includes Viruses, Worms,Trojans and Botnets. \u00a0It is no surprise that the Computing Technology Industry Association (CompTIA) tenth annual IT Security Information Trends report placed Malware at the top of the list of security threats. \u00a0CompTIA cited that eighty-five percent of Business Owners and IT Professionals have a moderate to serious concern about Malware. \u00a0Why should you care?<\/p>\n<p>Many times Malware intrusions will go undetected. Some malware may cause your computer to run slowly. \u00a0Some malware may be programmed to silently harvest privacy data from your hard drive, while other malware is programmed to destroy data on your hardware. \u00a0Other malware can turn your PC into a Cyber Hacker by exploiting security holes and using your PC to attack other PCs.<\/p>\n<p dir=\"ltr\">Costs associated with data breaches is estimated to be as high as a billion dollars each year. \u00a0Moreover, the number of Malware threats are exploding. \u00a0Symantec estimates there will be over 250,000 new threats (not attacks) identified on Android devices in 2012 alone. \u00a0What can you do to avoid Malware?<\/p>\n<h2>IT Security Risk Assessment<\/h2>\n<p dir=\"ltr\">The reality is you can not afford to eradicate one hundred percent of all cyber threats, so you need to have a pragmatic plan for defending yourself. \u00a0Start by understanding your security risks by reviewing your core applications and data, policies and procedures, as well as, your network infrastructure. \u00a0You are as vulnerable as your weakest link.<\/p>\n<h2>IT Security Compliance<\/h2>\n<p dir=\"ltr\">To protect your applications and their data, as well as your employee productivity, make sure all of your IT Assets are up to date with Operating System patches and updates. \u00a0IT Assets include desktops, laptops, servers, smart phones and tablet computers. \u00a0Also, keep your applications up to date with the latest updates. \u00a0Many of these security patches are designed to protect you from Malware attacks. \u00a0\u00a0In addition, keep your Anti-Virus and Anti-malware subscriptions current to protect yourself from Malware threats.<\/p>\n<h2>Business Continuity and Disaster Recovery<\/h2>\n<p dir=\"ltr\">If you are attacked by Malware you will minimize the impact on your business if you have a business Continuity and Disaster Recovery plan in place. \u00a0By understanding what applications and their data are most important, you can get up and running quicker, if you suffer a data loss.<\/p>\n<h2>Training<\/h2>\n<p dir=\"ltr\">Train your employees about the importance of IT Security. \u00a0If they are aware of the exposure they are more likely to follow policies and procedures by accepting security patches, reporting infections and data loss. \u00a0Periodic trainings will serve as a better reminder than longer sessions once per year.<\/p>\n<p><strong id=\"docs-internal-guid--e707388-3466-68a0-e9b0-eda6b19d3c35\"><br \/>\nIf you feel you may have malware infecting your IT Assets, or are concerned about what you would do if you lost data from a malware attack, you should contact your IT Support organization and request an IT Security assessment.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malicious Software or Malware is a serious concern to IT Security experts and business owners alike. \u00a0Malware is a category of Cyber Security threats that includes Viruses, Worms,Trojans and Botnets. \u00a0It is no surprise that the Computing Technology Industry Association (CompTIA) tenth annual IT Security Information Trends report placed Malware at the top of the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[6],"tags":[8,9,13,25,28,40,43,47,55,56],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Malware and Why Should I Care?<\/title>\n<meta name=\"description\" content=\"Malicious Software or Malware is a serious concern to IT Security experts and business owners alike. \u00a0Malware is a category of Cyber Security threats that\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zorro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/\",\"name\":\"What is Malware and Why Should I Care?\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2013-04-23T01:00:47+00:00\",\"dateModified\":\"2013-04-23T01:00:47+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942\"},\"description\":\"Malicious Software or Malware is a serious concern to IT Security experts and business owners alike. \u00a0Malware is a category of Cyber Security threats that\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Malware and Why Should I Care?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942\",\"name\":\"zorro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g\",\"caption\":\"zorro\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/zorro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Malware and Why Should I Care?","description":"Malicious Software or Malware is a serious concern to IT Security experts and business owners alike. \u00a0Malware is a category of Cyber Security threats that","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/","twitter_misc":{"Written by":"zorro","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/","url":"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/","name":"What is Malware and Why Should I Care?","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2013-04-23T01:00:47+00:00","dateModified":"2013-04-23T01:00:47+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942"},"description":"Malicious Software or Malware is a serious concern to IT Security experts and business owners alike. \u00a0Malware is a category of Cyber Security threats that","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/what-is-malware-and-why-should-i-care\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"What is Malware and Why Should I Care?"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942","name":"zorro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g","caption":"zorro"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/zorro\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/2264"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=2264"}],"version-history":[{"count":0,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/2264\/revisions"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=2264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=2264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=2264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}