loader image
1 (833) 944 6009

Viruses are becoming increasingly clever, desperate to access your sensitive data they will take every advantage in your IT security. In our previous article, we covered 6 common viruses you need to be aware of. Today we are here to inform you of different methods viruses use to spread to your network and devices.

We know how tedious this information is to absorb, so we have created a fun infographic to help you learn through entertainment. We have included fun imagery and statistics to help stress the importance of IT security. It is important that you remain aware of these threats and how they spread to help protect you and your clients.

Methods viruses use to spread onto your computer and devices include but are not limited to:

Removable Media

Jump Drives, dvds, blu rays, S.D. cards, any media that transfers files can be infected and sent to a user.

Did You know? In 2018 – 65% of cyber attacks were file-based — eve. Doc. bat. Hta. — and 35% were fileless — macros, script, in-memory!

Internet Downloads

Many files on the internet are infected with virus, and a good rule of thumb is don’t download anything off the internet. We know that advice isn’t exactly practical in this day and age, so here are a couple tips if you have to download files of the web. 

Pro Tip: Always scan with an antivirus software, while it doesn’t work 100%, it goes a long way keeping you safe.

Email Attachments

Many, MANY virus are transmitted through email attachments, do not click any attachments unless you’re absolutely certain it’s safe. (Link to phishing article)

Did You know? The average cost of a phishing attack for mid-size companies is $1.6 million!

Infected Links

Never ever click on a suspicious link you find online.

Pro Tip: Hover over the link with your mouse and it’ll tell you it’s domain, never visit a domain you are unsure of.

Did you know? 61% of breach victims in 2017 were businesses with under 1,000 employees.

Our IT security rule is, any time we have any reason to be worried about a piece of digital information we come into contact with we put the virus scanner to work. We have also set up strict junk mail settings to help weed out those phishing scam emails.

Now that you know how computer viruses are transmitted, you might be thinking “How do I protect Myself?” Well, we’ve got you covered. In our last article in our virus informational series, we cover 10 Ways To Defend Yourself Against Viruses.

We also offer tips and tricks to take your security knowledge to the next level with our Free eBook “10 things your IT technician wants you to know”. You can never be too safe in this digital era, and by acting proactively you can prevent emergency situations that would cost your company time and money.