Protecting Yourself
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hello. My name is Dustin, and welcome to malware.
00:05
There are many ways to protect yourself from our, but one of the easiest things that you can do is to keep all of your software and you're operating systems up to date.
00:14
Most malware attempts to use vulnerabilities and software and operating systems that haven't been patched yet. So if you've got your patches in place, it'll stop that malware from initially affecting and possibly spreading as well
00:29
in order to combat ransom, where you should also back up your data as often, it's possible this may vary from person to person, depending on what kind of day they have and how important it is. But you should always try and keep a backup of your data, and not just for ransom where, but in case your computer dies
00:47
or you lose hard, drive anything like that.
00:52
One thing you definitely want to be aware of. Those you don't want to keep your backup copy connected to your machine or on the same network share or anything like that, because most ransomware will actually look for any connected devices or, um, network shares and encrypt those as well. So you could have your
01:11
backup encrypted, rendering it
01:14
useless.
01:15
You should also use some form of anti virus software, most current products and do offer and J B or next gen features. And if you've got a Windows machine Windows defenders built right in, so you really have
01:32
no excuse to not be taking advantage of that that free built in software.
01:37
Most malware is still typically spread via email,
01:41
so you should always be wary of suspicious email, e mails and attachments.
01:47
If you have any questions about a specific you know, contact the centre of the email. You can do that by most likely sending a new email not replying to the same one, but sending a new email or calling them if you're able to or actually just that mean walking into our office in talking to them.
02:07
But you also always want to
02:09
take a look at all attachments, um,
02:14
before opening them. And there's certainly an entire southwards that can scan attachments. Or you can upload them to tools like Virus Total that can run an analysis on it. Little look for those virus signatures.
02:29
Not all malware will be caught by these methods, so a Zoe mentioned before the millions of new types of Mao. We're coming out every day,
02:38
so it's hard to be able Thio. Watch them all.
02:44
So the last thing I'd recommend doing toe help protect yourself from our is to hunt or look for IOC's, which are indicators of compromise.
02:53
If you are logging into your email and you get a notice that it was last signed on from a different I P address than you normally sign into, you might want to look into that a little further, determine what may have happened. Was there possibly spyware on the computer? That's still your password.
03:10
It's always good to look into these things to determine what could be happening.
03:15
If your computer's running only unusually slow, you can look to see what's using the processing power, your memory or your
03:25
that were connections.
03:29
If you can determine what's using that stuff, you can then determine whether it is legitimate or if it's possibly malware.
03:37
These tips can help keep you and your computer safe in the wild, wild west of the Internet.
03:44
In this module, we learned ah lot. We learned all about malware and what it is we learned and talked about the different types of Mauer like viruses and root kits and spyware. And then we went over some of the most famous Mauer the may have heard of like the Stuxnet virus.
04:02
Last we went over a few things you can do to help protect yourself from malware
04:12
module Quiz. Question one malware is
04:15
Is it a virus? Is
04:19
be malicious software.
04:21
See ransomware
04:25
or is it d malleable software?
04:30
Give you just a second to think about that,
04:38
and that's right about where is, Ah be malicious software.
04:43
It encompasses a wide variety of harmful items, including ran somewhere and viruses.
04:50
Creed has designed a new suite of tools designed to provide him with continuous access to Michael's computer, all while covering his tracks, allowing him to spy on Michael.
05:02
What type of malware did creed design? Is it a a Trojan?
05:08
Be a worm,
05:11
See spyware
05:14
or is it d a root kit?
05:16
You know, I'll let you think about the definitions of each of those types of malware.
05:24
And, yes, Creed designed a rude kid that will help him spy on Michael.
05:29
Last question. Which type of malware can replicate itself without human interaction? is it a worms?
05:38
Be trojans.
05:42
See spyware.
05:44
Where is it? D a root kit.
05:50
That's right. It is. Ah, a worms Worms can replicate without any human interaction.
Instructed By
Similar Content