Manage Learn to apply best practices and optimize your operations.

Email attacks that threaten networks and flood inboxes

8/8

Types of malware that attack corporate email infrastructure

Source:  id-work/iStock
Visual Editor: Sarah Evans

Malware, short for malicious software, is intended to gain access to or harm a computer. Attackers distribute various types of malware via email attachments that deliver viruses, worms, rootkits, Trojans, keyloggers, spyware and adware.

Hackers manipulate code to forward email messages with malware. The malware actively hides from the user. Often, a message containing malware is disguised to look like it originated from a known contact. When you open the attachment, malware spreads to your computer.

Certain types of malware can lay dormant in a system until executed to self-replicate to other connected computers and devices, potentially endangering the entire corporate infrastructure.

Investigate these factors that make computers more susceptible to malware attacks: OS design flaws, running multiple computers on network that runs on the same OS, allowing users too liberal permissions or simply using Microsoft Windows OS -- since it's so popular, it gets the most malware.

To protect your infrastructure from various types of malware, train end users about the dangers lurking in unknown email attachments and dubious websites. Also be sure to install and maintain antivirus programs across all devices that connect to the corporate network.

Check out more email attacks and learn how to prevent them from interfering.

Text by Sharon Zaharoff, the associate site editor for SearchExchange.

View All Photo Stories

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

As stated above use the Anti virus firewalls Trend Micro enhances existing e-mails security gateways detect blocks targeted e-mail attacks
Cancel
As good as your corporate spam filters may be there are always some that get through. Users need to be educated as to what is questtionable, LEAVE IT ALONE.  I get them, I call the network guys, forward it to them so they can check it out. They will then update out filters if necessary.
Cancel

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close