Different Viruses That Threaten Your Cyber Security

Different Viruses That Threaten Your Cyber Security

Crime has been an ever-present factor in our lives. It certainly has been the bane of our existence. With the advent of computer systems and working remotely, it was inevitable that criminal intent would evolve to meet our technological advancements. From the street to the cyber age, crime has definitely caught up. Our physical selves are no longer the target; it is our information that is at risk.


Cyber security or computer security is the fortification of information systems from malicious intent or damage to the hardware, software, and the information the system holds. Disruption and misdirection of the normal process of the service provided by our computer system is also a form of attack that strong cyber security processes prevent. One of the many forms of cyber threats is a virus. A good way to protect yourself and your system from any real damage is to have a basic knowledge of the different viruses that threaten your cyber security.


The more common type of virus that attacks your cyber security is called a Macro Virus. It is a virus that is made in a programming language that is usually placed inside a software application. Most common targets are word processors and spreadsheet applications. We all do documents and accounting spreads in Microsoft Office which is why this is a common target of those will ill intent. A macro virus is usually embedded within a document and runs the moment a document is opened. This is why you should never just open attachments in e-mails. One of the key foundations of cyber security is having antivirus programs in place. They can detect a macro virus yet newer and stronger types of this virus are constantly being made so detecting them can still be difficult.


Another type of virus is called an Overwriting Virus. It is program that actively infects and destroys the original program coding of a system’s memory. They are designed to attack the operating system (OS) and to overwrite the set information. This sort of virus is determined to be more harmful as they target parts of a user’s system. This virus is acquired usually through file transfers and e-mails.


The Directory Virus does its damage by changing the paths that specify the location of a file. Often, when your system has been hit by this virus, it becomes difficult or impossible to locate the original files.

The Boot Virus attacks the boot sector of a hard disk or a bootable drive. The boot sector is a crucial part wherein the data on the disk or USB is stored along with the program that allows it start up. The best way of avoiding boot viruses that compromise your cyber security is to ensure that your portable memory drives are protected and constantly scanned. Also, never start your computer with an unknown drive attached to it.


A Direct Action Virus selects one or several files to infect every time its code is executed. Its intent is to replicate itself and to spread to other files whenever its program is activated. It often chooses files that are at the root directory of the system’s hard drive. That is the part that is responsible for doing particular actions when the system is started. In most cases, a direct action virus will not delete your system files or attempt to lower the overall performance output of your computer. It will, however, block access to certain applications and files. The most effective defense that cyber security has is a constantly running virus scanner that will not only locate and detect the virus but will destroy it as well.


Your cyber security must always have these key ingredients: an anti-virus program, an anti-spyware program, a running firewall, constantly updated system software, an anti-spam program, and up-to-date back up of your data. Having these is sure to help protect your important data from those who wish to profit from your systematic loss.

Tips on Computer Security

The world is full of scammers today that are going to try and trick you in a phone call or steal your information online.  As such, sometimes it can be hard to tell who is the real deal and who is trying to hurt you.  One of the places that you need to be most careful is your computer, and this is often the place that people are the most liberal.  If you’re looking for ways to clean up your technological life and its potentially dangerous parts, here are some great tips on computer security.

Get good quality protection

These are tons of free anti-virus software programs out there that you can look at for your computer.  While no one is arguing against the fact that free = awesome, there are some things that free programs won’t do that paid ones will.  So, strongly consider the paid anti-virus software programs with the free ones and make sure that you are getting the exact same service.  If you see differences, make sure you go with the one that is going to actually help you out the most.  Free might be awesome, but it’s not worth anything if it doesn’t properly protect your computer.

Actually use it

This is the point right here.  When you get the anti-virus software installed on your computer, you have to make sure that you actually, you know, use it.  That means you need to keep the firewall on, and allow the computer to do its scans and updates regularly.  It’s understandable that you want to simply say “do later” when you have the option to allow it to happen, but that’s how you get into situations of vulnerability.  So, you need to make sure that you allow the scans and other tasks to happen on schedule.  One great option that doesn’t interfere with your day would be to allow it to do scans when you have finished your work and are done with your computer.  That way it can do its jobs without interfering in your day.  There are plenty of options to explore this idea properly.

Use discretion when visiting new websites

Even with your anti-virus in place, you must be careful when you are using new websites, even if they look fine and dandy.  Computer viruses are sneaky now days and it doesn’t take much to allow one through your firewall into your computer.  So, make sure you are on a good website and don’t click on anything unless you know for sure what you’re clicking on.

If something seems fishy, get out of there

On that same note, you have to remember to trust your gut as well as your computer skills.  If you are on a website and something seems fishy or strange, just close the browser and immediately do a scan.  It could be a new toolbar that pops up, or something strange that makes your computer sluggish all of a sudden…whatever this is, you have to make sure that you are careful in watching how everything comes together around you.  So, no matter what leads you to believe so, trust yourself to know when something is off, and get your computer safe from that website as quickly as possible.  You know so much about computers that the odds are that you’ll notice something is out of whack pretty soon after it happens.

Get a browser that will protect you

There are several browsers to choose from when you are picking the one that you use as your main one, and don’t be afraid to shop around and take a look at what’s out there.  Check online and compare them against each other.  The goal is to pick one that is going to take care of you in a rough patch, security wise.  There are browsers out there that aren’t good for protecting you against a strange website (Internet Explorer, Safari) and others that tend to have a better understanding of the fact that you’re looking for protection against the weird websites that you may not detect as dangerous right away (Chrome, Firefox).  These browsers will automatically redirect you before you can go to strange websites and will let you know why and how they are doing this so that you can learn from the experience, too.  These are the ones that you are going to want to allow your computer to use for further protection.  Remember, it only takes one wrong click to potentially jeopardize your computer and all of your personal information.

Do deep scans regularly

The last thing about computer safety when it comes to your anti-virus protection is remembering that you need to make sure you allow your system to do the deep scans on a regular basis.  That is, those deep scans will want to go into every single file on your computer to make sure there is no virus hiding out and waiting to strike.  These take a while and tend to slow your computer down, so many people don’t allow them to happen very often.  This isn’t a good idea, however, and you need to make sure that you do, in fact, allow it to happen so that you can keep your computer protected.  These are critical for making sure that nothing is corrupted at all and your information is kept private and completely safe.

Computer security is getting harder to enforce as hackers get smarter and faster, and kids of the internet get sloppier.  No one wants to think that way, but is the way that the world is headed without question.  So, use these tips to keep yourself safe and feel free to send them on to your friends and family so that they can get in on the idea, too.  There will be some who read this and think that it’s overkill, but you have to remember that your personal information is worth a lot more than you want to think, so take the extra precautions to keep yourself safe.

Today’s post sponsored by Newton Fire and Flood, the top fire damage repair company in Boston, MA.  They’re great people to work with!

Just Like Spotify

A close friend sent me this from his son – from YEARS ago.  Sounds a lot like Spotify doesn’t it?

The Rock Rhythm was founded by Luke, an intelligent entrepreneur, on December 26, 2005.  Luke was listening to the radio one day when he realized that he hardly liked anything that was played because none of it was rock.  On that day, he would create a business that sold solely rock music online.  The Rock Rhythm promises to provide high quality rock music at a low price (only fifty cents).

The Rock Rhythm is run by Luke and John.  This music business is an in-home business for both individuals.  John’s computer provides for the music storage because of its 250 GB hard drive.

From his house, John tracks the customer usage and purchases of songs to determine what type of songs appeal most to the customers.  Then, he creates a report with usage statistics of the music, through the use of Microsoft Excel 2003, and sends it to me.  I review the reports, and then search the internet and listen to the radio for new rock songs that the customer may enjoy, according to the reports.  After finding suitable music for our business, I send emails to the artists of those songs in order to obtain their permission to use and sell their songs.  In return for using their songs, I pay a small royalty, or fee to them.  If the artist accepts the deal, I give John the go-ahead to retrieve the music and download it to his computer for our businesses’ usage.  In order to sell our music, we purchased a domain name from www.godaddy.com for only $8.95 per year, and used Yahoo’s free web-page builder to create the site.  After obtaining permission to use the songs, I immediately create a list of all of the new songs that I now have permission for.  I use Microsoft Excel 2003 to create the report, and in the report, I include the following: song name, artist, type of music within the rock genre, and what where on the web the song can be found.  After John receives my report, he downloads all of the music to his computer, scanning them for viruses as they are completed.  He then uses a program called Gold Wave to copy each song and trim them into 30 seconds clips.  He then uploads the 30 second clips onto our website, so the customers can preview the songs before they buy them.  If a customer chooses to buy a song, he can pay for it using a credit card.  The customer’s billing information is sent directly to my computer, and I bill that customer for the songs he purchased.  Directly after I bill the customer, part of the money is automatically transferred to the account of the song’s artist (which I have on record), and the rest is divided evenly among our businesses multiple Key Bank accounts.  Another job of mine is very quick and easy; I am billed $8.95 each year to keep our domain name, so I send in a check.    Once the customer has paid for the song, the song is automatically unlocked for that customer to download from John’s computer.  The security programs on John’s computer protect him and his music so that the customer can not upload anything harmful, but only download the song (one time).  Finally, at the end of each year, John and I get together and analyze our profits and our business in general.  We then decide together if we need to make any software or hardware purchases for our business.

This computer-based system provides for all of our company’s needs at the moment because our business is very small.  The only employees are John and I.  I take care of money and he takes care of the music, as explained above.  Computers make our jobs a lot easier because we can do almost all of the work on them.  One of the best features is the program Microsoft Money 2007, which we configured to automatically pay royalties, and bill accounts of the purchasing customers.  Also, since we have Road Runner internet connections, anything that needs to be done online, like management of the company website, or management of our bank accounts at Key Bank, can be done very efficiently.  Software and hardware purchases that John and I deem necessary can be also purchased online at reduced prices.  If necessary, we can also buy cheap software and hardware from COMP USA which is only about a mile from my house.  Really, the computer-based system allows John and me to remain in our houses.  In turn, this allows both of us more free time to maintain our company.  Lastly, at the end of each year, John and I review the most recent song usage reports that he created to decide which songs can be taken off our site.  The process of looking of looking through the inventory and deleting songs takes about 3 work-days.  We usually work from 8 a.m. to 12 p.m. and from 1 p.m. to 3 p.m., Monday through Friday.

Over the next five years, I see our business growing a lot.  Radio stations such as channel 103.1 and many other alternative and modern rock stations are becoming increasingly popular.  Because of the rapid rate at which the music industry is growing, John and I will have to hire other people to help us do our job.  We will also have to purchase new computers to allow for more music storage and to allow our newly hired employees to split up the workload we have and make our business even more efficient.  At the moment, John’s computer has sufficient storage space, but in the future we will need more.  A building might have to be leased in the near future depending on the number of employees that we hire.  It would be easier to communicate to everyone if we were all in the same place.  Another possibility some time in the future is The Rock Rhythm combining forces with Apple.  That may not be for a while though because I, as the company representative, have to speak to Apple’s company representative to see if this is a feasible option.

These new changes will have a significant effect on our computer-based system.  First of all, we need to purchase new computers for storage and other business use.  The new computers will need to have upgraded sound software, large hard drives, and our Road Runner internet connections.  A lot of RAM will also be needed to allow for fast processing of information.  Basically, our computer-based system will need to include many more computers, all having the ability to access to our company’s website and the capacity to do the work John and I have been doing by ourselves.  Security is going to be an issue with our larger computer-based system, so all of the computers will have to have multiple forms of security, including anti-spyware software, anti-virus software, and firewalls in order to protect our computers, music, and money.  All in all, our company is going to grow in size.  The profits of the past year will cover the expenses of the new workers, new computers, and the possible building that we will need.

10 Commandments of Security

Evaluating security in a corporation is a difficult task.  It’s an intense and continuous process involving technology and proper management.  However, it’s absolutely essential to staying alive in today’s business environment.  There are 10 commandments that one should follow that guide the decisions everyone should be making for the security of their businesses.  Let’s begin:

Define the policy

The security policy is a document that guides all data security in an organization.  It shouldn’t be a one-pager, but it can’t be 100 either – or no one will read it.  Write it; then present it.

Use security technology

Any network housing secure data (everything about your company and your people) needs to be protected.  That means installing the proper security measures, such as a firewall, spam filters, virus protection, etc.  The firewall blocks unknown connections to your system, the spam filters block garbage and pop-ups, and the virus protection gets rid of anything that happened to make it through.


Everyone from the CEO to the janitor needs to be aware of how to use the system, how to avoid threats, and what they can do to prevent incidents.  Social engineering is becoming more and more difficult to spot, so it would be wise to implement training with examples of malware, email scams, and other things that corporations can face.  Numerous high profile companies like Target and Best Buy were hit in the past couple years due to poor awareness and poor security measures.

Monitor Data

Data is always stored.  The question is where.  Where are the servers located?  Who has access to that physical location?  What is your plan in case there is a breach at this location?  Even something as simple as the printer can be dangerous.  Many printers offer a secure-print feature; turn it on!


Keep your hardware and software up to date.  Security solutions from major providers like Norton, McAfee, and other industry players release frequent updates to ensure that you face less exposure to potential threats.  New issues are identified across the globe daily, and fixes are built into each release the company puts out.  Make sure you have the latest updates installed asap.

Everyone is accountable

The tech department is not the only one responsible for the company’s data, everyone is.  Provide the proper training and hold everyone in the organization accountable for safeguarding data.

Careful with access

Evaluate who should have what types of access.  Top access/administrator rights should be split among the IT leaders so that one person does not have full control of the system.  Additionally, system admin access should never be given to the average employee.  Carefully review and choose who should see what and create a policy that you will follow to the T.

Don’t be cheap

Security measures and products are put in place to protect the company.  Don’t sacrifice the security of the company because you were too cheap to buy the correct system.  Find a product/service that fits your needs and go with it.  Do not let money be the factor that causes you to pick a system that’s less than necessary.  The risk of loss is millions of dollars down the road with a poor system.

Security is continuous

Don’t leave security alone.  Security is a continuous process of monitoring how things are going, adjusting, and improving things going forward.  Continue to question processes and make them the strongest they can possibly be.

Understand the importance of information security

If you haven’t seen the news recently, you’ve missed high profile cases one after another where the CEO stated “I didn’t think it would happen to me” and the company loses millions of dollars.  Security breaches are very real and can happen to anyone.  For example, hackers managed to knock out the US governments Department of Transportation website for a good 15 minutes this past year.  The threat is real.  Be prepared.

These are the 10 commandments of information security.  We hope you enjoyed them.  Stay vigilant.