FAQ

Question: Do you offer employee cyber security prevention training?
Answer: We are excited to announce our employee security training. The training is interesting and engaging and makes extensive use of multimedia. Employees will learn about phishing scams, ransomware, phones scams and the dangers of public Wi-Fi. The training hits a broad range of security topics. Click here to learn more.

Question: Do you keep current with new and emerging threats?
Answer: F-Secure is constantly improving its detection and protection technologies, making sure users are always protected against the increasingly complex threats of today. In combination with frequent, automatic updates, DeepGuard™ cloud computing technology (a feature that also works without a network connection), ensures immediate reaction and fast cures to all new and emerging threats.

Question: What is the best cyber security protection plan for my business?
Answer: This will depend on the type devises you have in your office workstations, cell phones, laptops, server, mobile phones etc…contact us today for your free threat analysis.

You also probably wondered at least once how many types of malware (malicious software) are there and how they differ from one another. Here’s a super quick overview:

Adware – delivers bad ads and can infect your computer with additional malware.

Bots – malicious code engineered to perform specific tasks. They can be both harmless and malicious. More on bad bots in Daily Security Tip #97 (coming your way soon).

Bug – cyber security bugs (flaw in software) open up security holes in computer systems that cyber criminals can take advantage of. In this context, bugs can allow attackers to gain access to a system and do irreparable damage.

Exploit kits (EKs) are computer programs designed to find flaws, weaknesses or mistakes in software apps (commonly known as vulnerabilities).

Ransomware – a type of malware that encrypts the victim’s data and demands a ransom in order to provide the decryption key. More info on how to protect yourself against it here.

Rootkit –  a type of malicious software (but not always) which gives the attackers privileged access to a computer. A rootkit is activated before the operating system boots up, so antivirus can’t detect it.

Spyware – a type of malware that will spy on your activity (browsing habits, keystrokes, financial data, etc.) and send the information to servers controlled by cyber criminals.

Trojan Horse – malware that’s able to disguise itself as a normal file, to trick victims into downloading and installing more malware on their devices.

Virus – a form of malware that can copy itself so it can spread to other computers. Viruses attach themselves to other computer programs and execute malicious commands when the victim uses those compromised programs.  Thus, viruses rely on the victim’s activity to spread.

Worm – a type of malware that exploits security holes in operating systems. Worms use the infected system’s resources and self-replicate. They spread independently, without requiring the victim to do anything.