Phishing? Ransomware? What does it all mean?
top of page

Phishing? Ransomware? What does it all mean?

If you’ve ever been confused by the waffle around internet security, you’re not alone! Countless IP addresses are attacked every day, but how do you make sense of it all? As part of our series on the ever growing issue of internet security, allow us here at Solve-IT to bust through some of the jargon!


Virus - No, not a cold or the flu, but a computer program that interrupts the normal running of your workstation with its own malicious code.


Malware - A piece of software written and designed to specifically cause damage to a workstation or business.


Phishing - Far from catching a few mackerel, phishing is a fraudulent attempt to get you to hand over bank details, passwords or other sensitive information.


Spear-phishing - Again, no cod or trout here – but spear-phishing is a targeted, phishing attack, in which the attacker pretends to be a trusted sender or member of your organisation.


Ransomware - A type of malware that threatens to lock down your PC or business, unless you pay up!


Spyware - Another form of malware that secretly monitors your device, taking note of your activities and steals sensitive information – like bank details and passwords.


Ahhhhhhh! What do I do to protect myself!

Don’t tear your hair out just yet!

Here are some of our tips to help you protect yourself out there


  1. Install Anti-Virus/Malware Software - This might be an obvious one, but there are so many people out there with no protection software installed! We recommend Malwarebytes Anti-Malware Protection and Managed Antivirus

  2. Keep Your Anti-Virus Software Up to Date - Having protection software is the first step; maintaining it is the second.

  3. Run Regularly Scheduled Scans with Your Anti-Virus Software - For most anti-malware or anti-virus softwares, they have the ability to schedule scans to start in the background. Once you have set them up, you can tick this one off.

  4. Use secure passwords, and never share them with anyone!

  5. If you receive a request for payment to a bank account you don’t recognise, but from a trusted sender – give them a call on some previously stored contact details, not the ones in the suspect email.


Remember, don't be complacent and think "it won't happen to me!"


Fraudsters often don't target specific people, they target IP addresses. Make sure yours isn't next by contacting us about our Endpoint Security Solution!

33 views0 comments
bottom of page