{"id":365,"date":"2018-07-31T15:53:59","date_gmt":"2018-07-31T15:53:59","guid":{"rendered":"https:\/\/i4t.ca\/?p=365"},"modified":"2018-12-07T16:08:57","modified_gmt":"2018-12-07T16:08:57","slug":"has-your-network-been-infected-by-a-computer-virus","status":"publish","type":"post","link":"https:\/\/i4t.ca\/en\/has-your-network-been-infected-by-a-computer-virus\/","title":{"rendered":"Has your Network been infected by a Computer Virus?"},"content":{"rendered":"<div id=\"dslc-theme-content\"><div id=\"dslc-theme-content-inner\"><p style=\"text-align: justify;\">If it hasn\u2019t happened to you personally, it\u2019s happened to someone you know. Your computer has been hacked. I know it\u2019s too scary to think about but it happens literally every second of the day. Someone, somewhere has had their personal information on their computer system has been compromised. They have been violated: passwords, financial information, and confidential data that they thought was safe is now in the hands of criminals.<\/p>\n<p style=\"text-align: justify;\"><strong>Has my computer been infected by a virus?<\/strong><\/p>\n<p style=\"text-align: justify;\">Picture this, it\u2019s late at night and you\u2019re working on an important project and suddenly start noticing pop-ups repeatedly on your computer screen. Your files are taking too long to load. There is a good chance that your computer has been infected by a virus. In recent years there have been many examples of malicious viruses that have costed companies and individuals millions of dollars:<\/p>\n<p style=\"text-align: justify;\">\u2022 Cryptolocker, was released in September 2013 in email attachments; encrypting the user\u2019s files so that they couldn\u2019t access them with a a decryption key in return for a sum of money<br \/>\n\u2022 Slammer, after only a few minutes after infecting its first victim, it doubled itself every few seconds and had infected half of the servers that essentially ran the internet within minutes.<br \/>\n\u2022 Anonymous viruses from the Ukraine that affected thousands of computers, disrupting ports around the world and halted production at a factory in Australia.<\/p>\n<p style=\"text-align: justify;\">While these viruses might be some of the most common forms of online security threats, there are many others that are just as deadly including:<\/p>\n<p style=\"text-align: justify;\">\u2022 Botnets<br \/>\n\u2022 Distributed denial-of-service (DDoS)<br \/>\n\u2022 Hacking<br \/>\n\u2022 Malware<br \/>\n\u2022 Pharming<br \/>\n\u2022 Phishing<br \/>\n\u2022 Ransomware<br \/>\n\u2022 Spam<br \/>\n\u2022 Spoofing<br \/>\n\u2022 Spyware<br \/>\n\u2022 Trojan Horses<br \/>\n\u2022 Wi-Fi Eavesdropping<br \/>\n\u2022 Worms<\/p>\n<p style=\"text-align: justify;\">The reality is that many more cybersecurity threats are being created each day.&nbsp; While completely eliminating threats is next to impossible, protecting against them without disrupting day to day business operations is a top management concern. As a company delivers more of its products and services online, it has to adapt to the increasing threats and rise to the challenge as these threats will only increase not only to remain competitive but to protect its clients data.<\/p>\n<p style=\"text-align: justify;\">What are the consequences and potential impacts of cyber security attacks and how can the risks be mitigated? &nbsp;Does their risk plan account for all of the potential incomes assigning probabilities of occurrence and plans of action? Do they have the necessary resources in-house to deal with cybersecurity threats in-house or do they require external resources?<\/p>\n<p style=\"text-align: justify;\">While there isn\u2019t an obvious solution, companies must come to terms with their risk exposure to cybersecurity threats and create solutions that encompass strategy, operations, risk management, and legal and technology functions. Dennis Waitley once said \u201cexpect the best, plan for the worst, and prepare to be surprised\u201d We hope that you will be pleasantly surprised.<\/p>\n<p style=\"text-align: justify;\"><strong>Summary<\/strong><\/p>\n<p style=\"text-align: justify;\">Has the data and confidential data on your computer system been compromised and what can you do to minimize the damage?<\/p>\n<p style=\"text-align: justify;\"><strong>#cybersecurity #computerviruses #malware<\/strong><\/p>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>If it hasn\u2019t happened to you personally, it\u2019s happened to someone you know. Your computer has been hacked. I know it\u2019s too scary to think about but it happens literally&nbsp;[&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":536,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-365","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","clearfix"],"_links":{"self":[{"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/posts\/365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":0,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/posts\/365\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/media\/536"}],"wp:attachment":[{"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/media?parent=365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/categories?post=365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i4t.ca\/en\/wp-json\/wp\/v2\/tags?post=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}