Concept After Removal of Computer Viruses by Antivirus Software
Information is part of the assets of a company and must be protected. In this instalment we will talk about antivirus, its evolution and its main characteristics, and which one we should choose in our business to feel as safe as possible.
And why “as safe as possible? Am I never going to be totally sure of being protected? No, unfortunately the answer is no. The protection of computers is a competition between two sides: those who try to use our computers to do harm and those who try to defend us. Unfortunately for us, those who protect us are almost always one step behind those who try to harm us. Although ANTIVIRUS companies have their research department to develop a cure before someone realizes that the vulnerability exists, most of the time they act reactively: once the difficulty is raised, they look for a way to solve it.
Starting at the beginning: What is a virus?
Those who had to name the malicious programs that try to get into our computers used an analogy of something everyone knows: a disease. Diseases that are transmitted by contact between humans are carried by "viruses", hence the common way of knowing them. Although at first they were ways of making jokes or gaining popularity for having managed to enter some difficult site, later they sought to do even more damage or steal sensitive information.
Evolution of viruses
The first known virus dates from 1987 and was called BRAIN. All it did was modify the index of the hard drive, making the system unusable. The first Antivirus Software was released in 1988, aimed purely at disinfecting and protecting systems from BRAIN and other similar threats. From here it may get complicated, but I will try to be as clear as possible.
At the beginning, all viruses came directly in an executable file (ending in ".exe") and by double clicking on our desktop we installed it. They came in the form of email attachments with messages like "Pay attention to this" or "Open immediately." They generally came from known senders, appealing to user trust to install new programs on computers. If we did so, it would forward that same email to our entire address book with the same original attachment and thus it was continuously replicated.
Fortunately, it was easy to correct. A small cultural change and this form of infection practically disappeared. At this time almost all of us instinctively repeat the phrase "I should never open files from people I don't know", but even without knowing this, Windows has a protection so that no program is installed without the double authorization system. First I have to click on the program to install and then give it administrator authorization to do it.
Additionally, Antivirus Software have a constantly changing list that filters potentially dangerous files by name and extension. Modern antivirus also analyze the lines of code of the programs that we will install and will allow or not allow us to complete the process if they do not find anything suspicious.
Complicating things: worms, polymorphs, and Trojans
As you can imagine and may even have suffered, hackers and malware generators did not sit still and began looking for more creative ways to infect computers. The "worms" ("worms", as they are known in English) are programs that are installed surreptitiously and do not generate any noticeable change, but if they leave an "open door" for the hacker to have access to our computer or can use it as a springboard to attack other systems. Then came the "polymorphic" versions, which changed as they infected systems, making their filtration or deactivation much more difficult.
And as in the Trojan Horse metaphor, viruses known as "Trojans" are programs that mask another program inside. They arrive in a familiar format, generally from people we know or in programs that have minimal but often imperceptible alterations, and they install two things instead of one when we run them.
There are more types of viruses such as "hijackers", "zombies" and "macro viruses", all with the intention of giving access and control to another person on our team and who can use it as a dissemination or attack tool.
How do we protect ourselves?
There are different types of Antivirus Software, the main difference we could make is that some are free and others are paid. In the case of the free ones, the best known of this time are Avast, Avira, Bitdefender and AVG. While they use the same search engine as their paid version, they cut back on functionality and have a lot of trouble detecting new or variable threats (such as polymorphic viruses).
Generally, the changes are made "in cascade": companies will first update their database of paying customers and then that of free customers, giving priority to those who pay for the service.
To buy or not to buy the Antivirus?
First of all it is good that they know that although a few years ago it was enough to install a single program, today it is necessary to combine three functions: antivirus + anti-spyware (spyware that will send our data and preferences to whoever created it) + anti-trojans. So we have to analyze which brand offers us more features or complement it with additional programs.
In the case of a personal computer, where perhaps the most we can lose is program reinstallation time and a few photos from this year's vacation, it usually makes no difference. We must be careful with the pages we visit and emails with links that we do not know, but otherwise we will be well protected.
Very different is the case in our company. Here we not only have to protect business continuity and avoid unnecessary reinstallations and failures, but information is important and we must keep it as secure as possible. As we already said, you have to install several Antivirus Software (one with a paid search engine is suggested) and some complementary programs to complete the missing functions.
In addition, it would be logical to add perimeter security to the network with a firewall ("firewall", as it is known in Spanish). These programs can be installed on our own computers, be part of the antivirus that we hire or directly purchased as additional hardware. Its main function is to filter the traffic that enters and leaves our network, guaranteeing a wide level of effectiveness in the early detection of threats.
As I mentioned earlier, there may be paid versions of antivirus that have a firewall. It is a matter of analyzing the prices and services offered and making a decision according to the benchmarks (specialized analysis) that can be found on the internet.
Advantages of having an Antivirus
· We will be almost completely insured against potential threats to our equipment, our network, and our information, which will improve our productivity by eliminating service calls for equipment failure.
· By protecting our information, that of our company and our customers, we can guarantee that no one can use it to commit illegal acts or scams on our behalf.
· We will avoid providing our personal data to dangerous pages, which would lead to unwanted electronic purchases and problems with our lines of credit.
Some useful tips and recommendations
· Antivirus: Always use recognized brands. Evaluate if you are going to install a free or paid antivirus and do a Google search to analyze its performance on computers similar to yours and see if it is necessary to complement it with some other software to close a door that the main program does not close. The main antivirus brands are (in alphabetical order and not personal preference): 360, Avast !, AVG, Avira, Bitdefender, Kaspersky, Norton and Panda.
· Anti-spyware: Generally, paid antivirus has this option active, but if it doesn't exist, they must choose a complementary option.
· Deleting cookies and security: There are programs that delete personal information from our PC that can be used to generate user profiles. The best known is CC Cleaner, and it is recommended to install it.
· In any case, it is advisable to consult a specialist who will advise you on the best option based on your equipment, its use and the information to be protected.
No comments:
Post a Comment