Trojan horse
A Trojan Horse is an apparently safe program or data in which malicious code is hidden.
What are the risks of a Trojan?
A hacker can gain control and cause damage within the network via a Trojan Horse. Unlike a virus, a Trojan Horse does not replicate. A Trojan is often used as a backdoor to contact the owner of the Trojan Horse, who then has unauthorized access to the computer.
How can you protect yourself against a Trojan?
The Trojan Horse often uses social engineering and presents itself as a routine, useful or interesting program and/or data. To properly protect the network against Trojans, it is necessary to implement a multi-level cyber security strategy:
- Implement a gateway that can scan for viruses and have a method to check content at the perimeter of the network for email, HTTP and FTP such as Palo Alto Networks or Blue Coat
- Ensure that multiple virus engines are present (network, server, end-points)
- Ensure that .EXEs (executables) entering the network via email and web/FTP are quarantined/monitored You need to be able to analyze what an .EXE may be doing.
24 hours a day, 365 days a year
IT Support
Our IT support is excellently organized. Our employees are available 365 days a year, 24 hours a day, 7 days a week.