Viruses and Malware: Tricks, not Treats

You are not sure how it happened exactly. Maybe you clicked a link from that email with an unknown return address. Maybe that thumb drive you thought was safe to use was not as clean as you thought. This is what happened at Mar-a-Lago last year when a thumb drive was confiscated from an intruder and then plugged into a computer that belonged to a member of the Secret Service. Or, maybe you skipped a couple updates on your protection software. Either way, you are now staring at some rather crippling malware that has managed to worm its way into your device and throw off not only your daily routine, but your security.

Getting any kind of virus or malware on your computer is not only inconvenient - it can be disastrous, mainly because both classes can cause damage to your device and its data. In terms of viruses, some may overpower a device to the point of crashing, whilst some might fill the screen with inescapable messages. Really, the function depends on the intentions of the virus’s creator, which is usually as mysterious as the virus itself. In addition, once a virus takes hold of a device, the results are uncontrollable. Other kinds of damaging malware may self-replicate and spread unaided to other devices, like the worm; or disguise themselves as authenticated software so that when a user downloads it, a malicious third party may enter the system through a back door, like the Trojan. And then, there is disk encryption malware – or ransomware – that injects itself into your device and files when you download a fraudulent file (often sent to a target via email as a phishing attempt) and encrypts your data. This is not only difficult to remove from your device, but it can cost thousands of dollars to eliminate, causing damage to your financial standing as well as your system. Each of these nefarious methods can cause varying amounts of damage to your device.

So, what can be done to protect yourself from viruses and malware? Numerous precautions can be taken, and the following are only a few major methods of protection.

Regularly check your computer: There is a lot more to regularly checking your computer than updating your device when your system alerts you. If you use a Windows device, this is usually once a month with every Patch Tuesday. Set up your own schedule (daily, weekly, monthly - the more often the better) and check your software and drivers for updates. On the same schedule, check your computer’s default security settings. The main setting you want to focus on in this case is virus and threat protection. All you need to do to check your device is run a brief (emphasis on brief) scan that should only take about a minute. Windows Defender is the default tool provided with Windows. It will examine all of your files for any known form of malware or virus signature, and alert you if a possible threat is detected. If any threats are found, the system will offer to remove or isolate it for you.

Be cautious of mysterious links and USB connections: As seen in the Mar-a-Lago incident, USB drives cannot always be considered secure. In fact, several cases of cybersecurity breaches around the world have been a result of USB connections (see DMC’s USB Safety for more information). And, as simple as it may seem to accept the advice to not plug in random flash drives, human curiosity has a tendency of leading to our (and our technology’s) downfall. In a study performed at Urbana Champaign campus (reported by The Register), nearly 300 thumb drives were left scattered throughout a parking lot, and nearly fifty percent of these were retrieved and plugged into a device. Even chargers with USB cables can “jack” your data, injecting malware while you are innocently charging in a public place, like the airport (that is, unless the cable is charge-only, or uses a charge-only USB adapter). Meanwhile, these are not the only harmful connections you can make. You should never click on or download attachments from unknown email addresses, because these can contain viruses that infect your other files. PurpleSec’s “2020 Cybersecurity Statistics” states that email is the most common method of transferring malware, and that it takes up 92% of all deliverance methods. Nowadays, hackers and malicious third parties are able to make emails look like they come from the most secure, authenticated sources. If you are unsure if an email should be trusted, do your research: make sure that unexpected attachment sent by your colleague was actually from your colleague by using an alternate means of communication, or search online to see if anyone else has been targeted in a similar situation. Sometimes, reaching out to the sender using an alternate means is key to protecting your data.

Use web protection: There are antivirus programs available to protect you from sites that might be loaded with malware, whether it be questionable downloads or virus-loaded advertisements, also known as malvertising. If there are any questionable links or insecure attachments on said websites, the program is set to warn you before you access the page, according to the security settings that you have set. Be sure to apply higher security settings if your device hosts confidential information; that way the files will not become infected, compromised, or destroyed by any infiltrating malware.

Back up your data: In the event of a ransomware attack, lost data and expensive fees can be afforded by making backups of your data. On a Windows device, this is also an option built into the system, under your Update and Security settings. This gives you the option to add a drive to your device to save copies of your files. Always keep your backups updated to the most current version: that way, if the original data is encrypted, you will not have to lose your files or pay outrageous fees to have them unencrypted. 


Protecting yourself from viruses is really a matter of maintaining cyber-hygiene. Take care to examine what goes into your device, and double-check the source when faced with unknown attachments. If you remain constantly aware, you will find yourself more than ready to defend against malware and viruses. Meanwhile, viruses and malware are not the only source of risk when using a computer system. Find more details on CISCO’s page.

Previous
Previous

Celebrating Our Veterans

Next
Next

Congressional Research Service Releases Report on Deep Fakes