Scroll to top
Call Us Now To Discuss Your Needs +254-736-098632.

Five ways to avoid top malware threats

engage1 - February 27, 2019 - 0 comments

Backdoors, cryptomining, fake apps, and banking Trojans increased substantially in the past year, according to McAfee. Here’s how to protect your business.

In the past year, business professionals saw a 75% increase in banking Trojans, which allow cybercriminals to obtain financial credentials off mobile devices, according to a McAfee report released on Monday.

The report also detected an increase in backdoors, cryptomining, and fake apps through the latter half of 2018. These findings emphasize the importance of securing mobile devices, as well as their connected environments.

“Most businesses, from Fortune 500s to mom-and-pop shops, will likely deal with a security breach or vulnerability disclosure at some point,” Steve Povolny, head of advanced threat research at McAfee, said in a press release. “Those who are proactive and very public in addressing the issue have an opportunity to reinforce consumer trust and confidence.”

The report identified the following five ways companies can protect themselves from malware threats:

  1. Avoid installing apps from unknown sources: If you receive a text or email with a link instructing you to download something, take pause. Research the app developer, reviews, and download statistics. Look for typos and grammatical errors that could indicate suspicious activity.
  2. Click with caution: Be careful with messages in general. If you receive message from an unknown sender, be cautious interacting with it.
  3. Go directly to the source: Only download software from a company’s direct home page. Many comment sections are home to faulty links that criminals make money from.
  4. Use mobile security software: Smartphones carry as much data as computers nowadays. Companies should advantage of mobile security software to protect users from online threats.
  5. Stay aware: New mobile threats surface constantly. Companies must remind employees to stay vigilant for warning signs of malicious activity.