Computer Acting Weird? How To Know If You Have Malware
Summary: Layers of cyber security are required to defend against malware attacks. Combining high-quality antivirus software, security settings and security awareness training can dramatically reduce the risk of a malware attack. How to know if you have malware? Learn the signs of malware infection and when to check for malware on home and office devices.
Cybercrime is increasing an average of 20% year-over-year. Remote network access and work-from-home has dramatically expanded the attack surface for cybercriminals. In addition, inconsistent or insufficient cyber security can compromise connected network devices like phones, tablets and printers, allowing malware to spread through the network.
What Is Malware?
Malware is an umbrella term that includes viruses, ransomware, spyware and many other forms of malicious software that can be installed on your devices without your knowledge. Depending on the attack strategy, cybercriminals can breach your private data, bombard you with unwanted advertisements and spam or demand ransoms while holding your data hostage. Malware can also collect the keystrokes you use on your devices, giving hackers passwords and logins to bank accounts, work accounts and email accounts. There are a variety of malware signs to look for that affect the function and operation of your connected devices:
- Crashes, Slow-Downs and Errors – If your computer devices suddenly crash, generate error messages or slow down, you probably have fallen victim to a malware attack.
- Relentless Pop-Up Ads – If you have not had pop-ups recently and suddenly ads are turning up in places where they should not be, then it is likely that you have been hacked.
- Device Does Not Shut Down or Restart – Although other issues can cause these symptoms, this unusual behavior could indicate the presence of malware.
- Appearance of New Toolbars and Icons – If unexpected software icons or toolbars appear on your desktop or in your browser, malware is likely the culprit.
- Battery Problems – If your device’s battery is not very old but suddenly drains quickly or overheats, malware could be the cause.
- Unrequested Changes to Default Search Engines – If suddenly your Google Chrome browser homepage is replaced by a search engine you have never heard of, or if new tabs appear seemingly out of nowhere, you should check for malware.
- Your Device Sends Emails – If emails you did not write are suddenly being sent from your account without your knowledge, it is a definite sign that you have been the victim of a malware attack.
- Inability to Add or Remove Software – If you cannot add or remove software from your device, it is likely that a cybercriminal is taking control of your computer system.
What is malware used for? Cybercriminals attempt to steal from victims directly or steal their data to sell - often selling it repeatedly - on the dark web to other cybercriminals. These thieves will use the data to steal identities. Identity theft is one of the most pernicious cyberattacks. The hacker’s goal is to steal unique identifying data, such as private personal information, bank accounts, Social Security number and professional credentials. In addition, cyber thieves can steal your access credentials (usernames and passwords) to gain access to other platforms and ultimately glean enough of your personal data to steal your identity. They can take tax returns, open new accounts and loans in your name, authorize fund transfers and more.
How Does Malware Infect Devices?
“Think before you click!” are words to live by. Hackers count on the impulsivity of users to lure them into clicking on downloads, attachments, ads and links designed to launch cyberattacks. Emails with headings such as “You’ve Won!” or “Your Account Is Locked” are intended to create a sense of excitement or urgency for users and are, therefore, more likely to prompt impulsive clicks. If someone has physical access to your device, they can use a removable storage drive (USB stick, SIM card) or memory stick to install malware on it. Make sure your phone locks and requires a password to open.
Email is one of the most common hacking methods for launching cyberattacks. These are called phishing attacks. The FTC defines phishing as “a type of online scam that targets consumers by sending them an email that appears to be from a well-known source – an internet service provider, a bank, or a mortgage company, for example. It asks the consumer to provide personal identifying information. Then a scammer uses the information to open new accounts or invade the consumer’s existing accounts.” Phishing now accounts for over 80 percent of all cybercrimes.
3 Steps to Protect Businesses from Malware
Training - One of the best ways to avoid becoming a victim of phishing or malware scams is to provide security awareness training for employees. It will give them the skills they need to recognize the latest malware signs to avoid falling for the sophisticated tricks used by criminals. It also protects the business network and the valuable data it contains, including protecting employees’ own personal information that resides on the company network. Make training mandatory for all employees.
Network Assessment - Request a yearly network assessment from your IT or cybersecurity provider. The technician will inventory and assess the security and settings of all devices that connect to your network and check for malware. Configuring and securing the network-connected devices such as servers, routers, computers, phones and more will reduce the risk of an attack. If an attack does take place, this assessment and inventory can speed recovery from an attack, reducing network downtime and recovery costs.
Antivirus Software with SOC Monitoring - Finally, have your technician install professional-grade antivirus software on your network and devices (not free or off-the-shelf software). Ask for software that provides live security operations center (SOC) monitoring. If the software alerts for unusual network activity, a live expert will review the suspicious activity. Your IT technician will be alerted if a breach is discovered and emergency action is required.
Unprotected Networks are Easy Targets for Hackers
Cyberattacks are expensive and time-consuming events, putting more than half of small companies out of business in the year following an attack. Basic protection is inexpensive compared to the ongoing recovery costs of an attack. Every layer of security added helps to protect your network and connected devices, making them more difficult to breach and less appealing to a cybercriminal.