Upload
david-lombrozo
View
19
Download
0
Tags:
Embed Size (px)
Citation preview
Roswell• GA • (770) 993-5428www.TeamLogicIT.com/RoswellGA
The TeamLogic IT differenceYour Technology Advisor
TeamLogic IT difference …
We are Technology Advisors
Our mission is to make the technology used by Small and Medium businesses BE their competitive advantage
What is malware
Malicious + software
Software that is designed to do bad things
Includes: Viruses, Worms, Bots, Zombies, Trojan Horses, Rootkits, Spyware, Keyloggers, Scareware, Ransomware and more!
Viruses and Worms: the Contagious Threat
Spread without users knowledge
Infected DVD/CDs, thumbdrives, etc.
Spread by running a program
Designed to do damage!
Can be proactively stopped with good antivirus software
Bots and Zombies: the Captive Threat
Infected by running a program
Bots make PCs deliver illegal data
Zombies create DDoS attackers
Designed to do no harm to host
Detection only after user notices problem
Trojan Horses and Rootkits: the Masked Threat
Designed to be hidden while attacking
Trojan Horses bring in bad malware
Rootkits is a masking technique that prevents detection and removal
Designed to trick you into a purchase
Detection only by frequent scanning
Spyware and Keyloggers: the Financial Threat
Designed to steal IDs and passwords
Spyware tracks visits and actioins. Might tie into webcam
Keyloggers will copy keystrokes to steal passwords or account numbers
Designed to steal your identity
Detection after data has been stolen
Scareware and Ransomware: the Existential Threat
Designed to extort money with threat of destruction of data
Scareware=threat. Ransomware’s=real.
Triggered by running a program when opening a email attachment
Quick action can mitigate damage.
Might have to pay ransom of ~$400!
Self-help limitations
Steps assume light infection of nuisance malware.
Go to a professional if any of the following:Scareware or Ransomeware
Conduit malware – lots of demanding popups
So many popups that you can’t do work.
Excess usage or activity
Identity theft
You don’t have 6-10 hours to work on problem.
Generic Steps to Disinfection
Remove unknown and unwanted programs
Use Antivirus and Antimalware to clean
Remove unknown and unwanted add-ons and configurations from all browsers
Remove extraneous files from system
Update system, utilities, programs
Put process in place to proactively protect
Removing Programs
Open Control Panel and select Uninstall Programs. Remove unknown programs
Tricks and tipsSort by date. Pay attention to newer installs and clustersSort by publisher.User Internet to learn about publishers and programsRemove toolbars and unneeded programs
Reboot whenever requested
Antivirus and Antimalware programs
Install good AV and AMYou can only have ONE Antivirus program installedReplace MSE or DefenderReplace expired pro versionsAvira and Bitdefender are decent free AV programsMalwareBytes and Spybot Search and Destroy are decent Antimalware programs
Update programs, immunize, setup schedulesRun AV and AM programs
Run one at a timeFix all issuesReboot as requestedRun additional times until clean
Clean ALL Browsers
Depending on browser, click on configuration, settings or Internet Options
Reset opening pageRemove all search engines except for one.Review add-ons and extensions.Reset security options to defaultReset Pop-up blocker
Remove temporary filesRemove cookies
Remove extraneous files
Remove temporary filesRemove unused programsUse Disk Cleanup (Windows Program)
Run on each hard driveCheck each option
Use CCleaner from PiroformRun Cleaner to remove filesRun Registry to fix issues
Update System
Update WindowsImportant and OptionalInclude Microsoft Office
Update JavaGo to Java.comMight have to repeat with each browserSet to check monthly
Update Adobe ReaderGo to Adobe.comSet to check monthly
Proactive Protection
Check Microsoft UpdatesCheck on Wednesday or ThursdayMost updates released Tuesday night
Run Ccleaner and/or Disk CleanupRun monthlyRun after software updates, installs or removal
Verify AV is running automaticallyCheck every other weekCheck AV logs
Scan for MalwareWeekly
Proactive Protection – great ideas
BackupsVerify that backups are workingTry to restore a file from previous day
Check cooling fansIf dusty, turn off computer, unplug and blow out dust
Remove unneeded cablesKeep area neat. Curl up extra cable lengthsCheck for frayed or pinched cables.
Replace old Backup Batteries (UPS)
S–H out of IT .
We take the
Roswell • GA • (770) 993-5428www.TeamLogicIT.com/RoswellGA