Trojan horse

A Trojan Horse is an apparently safe program or data in which malicious code is hidden.

What are the risks of a Trojan?

A hacker can gain control and cause damage within the network via a Trojan Horse. Unlike a virus, a Trojan Horse does not replicate. A Trojan is often used as a backdoor to contact the owner of the Trojan Horse, who then has unauthorized access to the computer.

How can you protect yourself against a Trojan?

The Trojan Horse often uses social engineering and presents itself as a routine, useful or interesting program and/or data. To properly protect the network against Trojans, it is necessary to implement a multi-level cyber security strategy:

  • Implement a gateway that can scan for viruses and have a method to check content at the perimeter of the network for email, HTTP and FTP such as Palo Alto Networks or Blue Coat
  • Ensure that multiple virus engines are present (network, server, end-points)
  • Ensure that .EXEs (executables) entering the network via email and web/FTP are quarantined/monitored You need to be able to analyze what an .EXE may be doing.

24 hours a day, 365 days a year

IT Support

Our IT support is excellently organized. Our employees are available 365 days a year, 24 hours a day, 7 days a week.

en_USEN