SHARE
Facebook X Pinterest WhatsApp

How to Prepare for the Ever-Changing Evolution of Malware

Only six years after the first personal computer was introduced in 1975, the world was introduced to the very first computer virus: Elk Cloner. It was written to infect the Apple LLC’s operating system, known then as Apple DOS 3.3. Once the virus was triggered, it displayed a poem explaining how Elk Cloner was copying […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Sep 24, 2015

Only six years after the first personal computer was introduced in 1975, the world was introduced to the very first computer virus: Elk Cloner. It was written to infect the Apple LLC’s operating system, known then as Apple DOS 3.3. Once the virus was triggered, it displayed a poem explaining how Elk Cloner was copying itself all through the victim’s machine and that it may be no easy task to reverse its effects.

It did not take long, however, for people to start pushing the limits past simple pranks and start making malicious software designed as actual attacks against their victims. In the early 1990s, for example, malware authors were learning the art of evasion. They understood that they could now benefit from hiding malware inside documents instead of just supplying their victims with more obvious standalone executables. By the mid-2000s, more than a million known computer worms were circulating around the Internet. Email spam was also becoming big business as malware authors stood to make serious cash by blasting out unsolicited email, “spam,” and getting just a percentage of users to buy their goods or click on links. And by 2010, Stuxnet was introduced to the masses followed by spin-offs that included Duqu, Flame and the Regin Trojan. The point is that malware has evolved from attacking individual users to gaining entry to tens of thousands of people’s banking information.

While technology and personal habits mature with each new cyber attack, the threats lurking around the corner do the same at a seemingly uneven pace. Because we can’t predict exactly what’s ahead, Fred Touchette, senior security analyst at AppRiver, has identified tips and best practices to prepare for ever-changing and always evolving malware threats. 

How to Prepare for the Ever-Changing Evolution of Malware - slide 1

Preparing for Malware Threats

Click through for seven tips and best practices to help prepare your organization for the ever-changing and always evolving malware threat, as identified by Fred Touchette, senior security analyst at AppRiver.

How to Prepare for the Ever-Changing Evolution of Malware - slide 2

Don’t Get Comfortable

It is important for both IT teams and end users to never become complacent with regards to computer-based attacks. It is unlikely that these attacks will go away — instead they will continue to evolve and search for the path of least resistance to get to what they want. Organizations and individual users should stay current on the latest threats by visiting security forums and ensure they have the latest patches applied to their systems.

How to Prepare for the Ever-Changing Evolution of Malware - slide 3

Knowledge Is Power 

Whether you’re a massive organization or a small business, one security feature that’s often free and underutilized is an ongoing employee education program. Human beings are the weakest link in the security chain and should therefore be given a great deal of attention as to how they can protect themselves. 

How to Prepare for the Ever-Changing Evolution of Malware - slide 4

Get Layered Protection

AppRiver’s Q2 Global Security Report showed that over 81 percent of emails filtered between April and June 2015 contained spam and/or malware. However, malware isn’t just coming through email anymore. With malvertising campaigns against the likes of the Huffington Post and Yahoo, among many others, downloading a virus can be as easy as clicking on the wrong ad while getting a daily dosage of Hollywood gossip. Adding layered protection, like spam and virus filtering, Web protection, and email encryption will help you and your organization block malware from all angles.

How to Prepare for the Ever-Changing Evolution of Malware - slide 5

Suspicious Attachments

Do not open attachments from unknown people or attachments that appear suspicious. This is a very, very common method for attackers to use – delivering malware straight to your inbox, which is both convenient and highly effective. Do not click on an unsolicited link or open an attachment unless you know it is reputable.

How to Prepare for the Ever-Changing Evolution of Malware - slide 6

Only Use Trusted Sites

There are roughly 252 million registered domains and a large portion of those domains are malicious. Some are quite obvious while other, legitimate sites can be compromised and host malware within their pages. Stick to the well-known, established sites to increase the odds of staying safe online.

How to Prepare for the Ever-Changing Evolution of Malware - slide 7

Have a Reliable Backup Strategy

Cryptolocker and its spinoffs, CryptoWall and CryptoDefense, made their first appearances around September 2013. This family of malware also known as ransomware had been around since the late 80s, but most of them didn’t create such a panic as Cryptolocker since most were easily subverted. Cryptolocker, however, employed strong encryption to scramble nearly every file on its targets, making them impossible to recover without the unique, private key used to encrypt them. Even if the Cryptolocker infection were successfully removed, the files would remain encrypted and unusable. This instantly made many of its victims aware of the importance of a reliable backup strategy.

How to Prepare for the Ever-Changing Evolution of Malware - slide 8

Review Financial Accounts Regularly

Review financial accounts regularly for suspicious activity. Sometimes a victim won’t realize they have been attacked. By monitoring accounts on a regular basis, you raise your chances of catching an attack before it causes too much damage. Catching breaches early helps stop the attack, recuperate damages, and possibly even catch the attacker.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.