What is malvertising? There are many types of online cyber attacks. There are phishing attacks, brute force attacks and malware attacks to name a few. Malvertising, also known as malicious advertising, is a cyber attack where online advertising is utilized to spread malware.  Cybersecurity ventures predicts that cyber crimes will cost the world 6 trillion dollars annually by 2021. This number is up from 3 trillion dollars back in 2015. These numbers are staggering.

How Does Malvertising Work?

You are visiting one of the sites that you normally visit. There is nothing visually that would throw you off to believe that you are about to be infected with malware. You see pop up banners and ads on every site you visit online, regardless of whether or not the site is legitimate or fraudulent.  You see a pop up add that peaks your interest. You click on it. Inside that one small click, is a code that relays all your computers information to a bad actor. They then have the ability to send you a piece of malware without any knowledge on your part. Now malware is installed on your computer.

Malvertising

How Do I Protect Myself From Malvertising?

Malvertising is concerning because as mentioned previously, you will not be aware or thrown off by anything on the website that would indicate that you would be compromised. Best practices to help protect yourself from malvertising include:

Do not click on pop up banners and ads on websites

Always update computer

Utilize a pop-up/ad blocker

Optimize Antivirus Software

Utilize Firewalls

Optimize Endpoint Defense

HOW CAN ENDPOINT DEFENSE BE IMPLEMENTED TODAY

Griffin Global has state of the art technology that will protect your enterprise from malicious actors and ensure your business and reputations remains intact. Sentinel,one of the services within SourceONE™ Managed Security Services offered by Griffin Group Global, is an advanced system that provides threat detection in real time. This service has the capability to:

  1. Detect the issue.
  2. Speed up the response to the issue.
  3. Isolate the issue.
  4. Mitigate the issue before your data is compromised.

 

Enter the text or HTML code here

No Responses

Respond To This Article

NEWSLETTER

Subscribe to Our Newsletter