Malware 10 minute presentation
-
Upload
david-lombrozo -
Category
Technology
-
view
19 -
download
0
Transcript of Malware 10 minute presentation
![Page 1: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/1.jpg)
Roswell• GA • (770) 993-5428www.TeamLogicIT.com/RoswellGA
The TeamLogic IT differenceYour Technology Advisor
![Page 2: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/2.jpg)
TeamLogic IT difference …
We are Technology Advisors
Our mission is to make the technology used by Small and Medium businesses BE their competitive advantage
![Page 3: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/3.jpg)
What is malware
Malicious + software
Software that is designed to do bad things
Includes: Viruses, Worms, Bots, Zombies, Trojan Horses, Rootkits, Spyware, Keyloggers, Scareware, Ransomware and more!
![Page 4: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/4.jpg)
Viruses and Worms: the Contagious Threat
Spread without users knowledge
Infected DVD/CDs, thumbdrives, etc.
Spread by running a program
Designed to do damage!
Can be proactively stopped with good antivirus software
![Page 5: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/5.jpg)
Bots and Zombies: the Captive Threat
Infected by running a program
Bots make PCs deliver illegal data
Zombies create DDoS attackers
Designed to do no harm to host
Detection only after user notices problem
![Page 6: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/6.jpg)
Trojan Horses and Rootkits: the Masked Threat
Designed to be hidden while attacking
Trojan Horses bring in bad malware
Rootkits is a masking technique that prevents detection and removal
Designed to trick you into a purchase
Detection only by frequent scanning
![Page 7: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/7.jpg)
Spyware and Keyloggers: the Financial Threat
Designed to steal IDs and passwords
Spyware tracks visits and actioins. Might tie into webcam
Keyloggers will copy keystrokes to steal passwords or account numbers
Designed to steal your identity
Detection after data has been stolen
![Page 8: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/8.jpg)
Scareware and Ransomware: the Existential Threat
Designed to extort money with threat of destruction of data
Scareware=threat. Ransomware’s=real.
Triggered by running a program when opening a email attachment
Quick action can mitigate damage.
Might have to pay ransom of ~$400!
![Page 9: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/9.jpg)
Self-help limitations
Steps assume light infection of nuisance malware.
Go to a professional if any of the following:Scareware or Ransomeware
Conduit malware – lots of demanding popups
So many popups that you can’t do work.
Excess usage or activity
Identity theft
You don’t have 6-10 hours to work on problem.
![Page 10: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/10.jpg)
Generic Steps to Disinfection
Remove unknown and unwanted programs
Use Antivirus and Antimalware to clean
Remove unknown and unwanted add-ons and configurations from all browsers
Remove extraneous files from system
Update system, utilities, programs
Put process in place to proactively protect
![Page 11: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/11.jpg)
Removing Programs
Open Control Panel and select Uninstall Programs. Remove unknown programs
Tricks and tipsSort by date. Pay attention to newer installs and clustersSort by publisher.User Internet to learn about publishers and programsRemove toolbars and unneeded programs
Reboot whenever requested
![Page 12: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/12.jpg)
Antivirus and Antimalware programs
Install good AV and AMYou can only have ONE Antivirus program installedReplace MSE or DefenderReplace expired pro versionsAvira and Bitdefender are decent free AV programsMalwareBytes and Spybot Search and Destroy are decent Antimalware programs
Update programs, immunize, setup schedulesRun AV and AM programs
Run one at a timeFix all issuesReboot as requestedRun additional times until clean
![Page 13: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/13.jpg)
Clean ALL Browsers
Depending on browser, click on configuration, settings or Internet Options
Reset opening pageRemove all search engines except for one.Review add-ons and extensions.Reset security options to defaultReset Pop-up blocker
Remove temporary filesRemove cookies
![Page 14: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/14.jpg)
Remove extraneous files
Remove temporary filesRemove unused programsUse Disk Cleanup (Windows Program)
Run on each hard driveCheck each option
Use CCleaner from PiroformRun Cleaner to remove filesRun Registry to fix issues
![Page 15: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/15.jpg)
Update System
Update WindowsImportant and OptionalInclude Microsoft Office
Update JavaGo to Java.comMight have to repeat with each browserSet to check monthly
Update Adobe ReaderGo to Adobe.comSet to check monthly
![Page 16: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/16.jpg)
Proactive Protection
Check Microsoft UpdatesCheck on Wednesday or ThursdayMost updates released Tuesday night
Run Ccleaner and/or Disk CleanupRun monthlyRun after software updates, installs or removal
Verify AV is running automaticallyCheck every other weekCheck AV logs
Scan for MalwareWeekly
![Page 17: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/17.jpg)
Proactive Protection – great ideas
BackupsVerify that backups are workingTry to restore a file from previous day
Check cooling fansIf dusty, turn off computer, unplug and blow out dust
Remove unneeded cablesKeep area neat. Curl up extra cable lengthsCheck for frayed or pinched cables.
Replace old Backup Batteries (UPS)
![Page 18: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/18.jpg)
![Page 19: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/19.jpg)
![Page 20: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/20.jpg)
S–H out of IT .
We take the
![Page 21: Malware 10 minute presentation](https://reader038.fdocuments.us/reader038/viewer/2022103118/55c07d88bb61eb89518b4816/html5/thumbnails/21.jpg)
Roswell • GA • (770) 993-5428www.TeamLogicIT.com/RoswellGA