Trojan Horse

18th December 2019 | Cybrary Trojan Horse

trojan horse cybersecurity breaches

A Trojan Horse is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

What does this mean for a SMB?

An SMB that trains and governs its employees to spot and avoid Phishing Attacks, USB stick attacks, and other ways that Malware can be installed on computer systems, can defend against Trojan horses. Untrained employees in your company can fall victim to a hacker’s trap by clicking on the wrong link, opening the wrong document, or attempting to install the malware that looks like a legitimate program. This can easily become a bigger issue when the infected user starts sending emails or documents to other colleagues or clients, spreading the malware to those devices as well. It is important to train your staff on the basics of cybersecurity and what they can do to prevent malware from getting into the system or network.  it is equally important to remove Administrator Rights from your employees to prevent the accidental installation of Trojan Horse malware.

Source: CNSSI 4009

If you would like to learn more about this topic, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!

Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more