Become a Partner
Back to Resource Center

What is malware?

What is malware?

Malware is an abbreviation of malicious software that is written to harm other types of software or hardware. Examples include spyware, viruses, ransomware, and trojan horses.

How does Malware work?

Malware includes any malicious software that can damage your computer system. This hostile and intrusive software tries to invade your computer, smartphone, network, tablet, or computer system.

There are different forms of malware. This way, the malware can disable or damage your (mobile) devices. It is also possible that the malware takes over the operation of your device, which prevents your device from functioning normally, and you risk losing valuable data. The hackers often ask you to pay money to get this valuable data back, also known as ransomeware.

Examples

Not all types of malware are viruses, but all viruses are malware. A virus spreads rapidly, from one device to another, by inserting code into programs or other files. Does the software not use other programs to copy and spread? Then it’s not a virus.

Adware
Another common form of malware is adware. This malicious software infects your device with advertising software and displays many pop-ups.

Spyware
Spyware is malicious software that infects your computer or phone. If your device is infected with this software, the spyware tracks your internet and surfing behavior. The criminals responsible for the spyware often sell your information to third parties.

Ransomware
Ransomware ensures that your computer, or the data on your computer, is blocked. The hackers who spread the ransomware demand money from the user. In exchange, they lift the blockade.

Trojan horse
Often a trojan horse ends up on your device because it is disguised as something other than it is. Without any suspicion, you will then bring in a trojan horse. It is only after the software has caused damage that you realize it is malicious. You may also be unaware because the trojan horse functions as spyware.

What are the consequences?

Sometimes, it is challenging to see the consequences of malware directly. Your system seems to be working fine because the malware is hidden deep inside your system. You can recognize malware in many ways. We list the most common consequences for you:

  • A clear sign that your system is infected with malicious software is a slowdown of your device.
  • Another signal that you don’t easily miss is an excess of advertisements and pop-ups on your screen.
  • Does your system crash regularly, or does your software crash regularly? This is also a sign.
  • Malware takes up a lot of space, so you can recognize the presence of malware by a lack of free disk space. Therefore, regularly check the available disk space on your device.
  • Because malware works in the background of your system, your computer’s fan may be blaring as the activity consumes a lot of power from your device.
  • New plugins, toolbars, and extensions may contain some malicious software.
  • Is your antivirus program no longer working and unable to update the software? Also, be aware!

What to do with malware?

Malware is not always easy to remove. The best thing to do is to come in contact with a cybersecurity expert. If you want to do something by yourself you can run a scan to find and malicious softwater on your device. Once your device is clean, it’s a good idea to change your passwords. Not only the password of the device on which the malware was found but also your email, social media accounts, your bank, and online stores where you like to shop. And always set multi factor authentication, if possible. Sometimes it is possible to use backups, but the malware may also be already on your backups.

How can I prevent malware?

The best way to prevent this is to be vigilant. See if you’re visiting secure websites and if the domain name ends in .com, .org, or another well-known extension. Ensure your operating system, browsers, and plug-ins are always up to date. Do not click on pop-up ads or open suspicious email attachments.

On your mobile, it is wise to only download apps from the Google Play Store or App Store. Please check reviews and score first, and do not download apps from third-party sources. Also, do not click on crazy links shared via social media, mail, or text.

But you can not be 100% to prevent everything. It is better to have a detection system, like Guardey. That way, you know directly when there is a threat.

Guardey’s Cyber ​​Alarm

To know as soon as possible that there are cyber threats, Guardey has a Cyber ​​Alarm. This Cyber ​​Alarm monitors all your internet traffic and checks whether malicious software gets on your device. If this is the case, you will receive a Cyber ​​Alert. This way, you can act on time and limit the damage as much as possible.

Do you want to be able to surf the internet without worrying about malware? Start completely free with Guardey and try for 14 days.

We are always there for you, promise!

Register now for free and never stress about cyber crime again.

Start 14-day free trial

Frequently Asked Questions

What is Guardey in short?

You just want to know what Guardey is, in a few lines, not scrolling through the whole website. We got you covered. Here you are:

Guardey focuses on three parts of your cyber security:

Connection
A safe and encrypted VPN connection via Guardey’s secure infrastructure or a Site-to-Site VPN.

Detect
We analyze information packages from the data going through the VPN tunnel, give clear insights into your data infrastructure, and provide alerts in case of threats like ransomware, viruses, and irregularities in your network.

Learn
Your cyber security is as strong as your weakest link. With Guardey, you can educate your whole team and increase awareness in a fun and efficient way through gamification.

It’s an advanced software as a service with applications for Windows and Mac OSX and an online platform for reporting and managing your teams and company policies.

How does the free trial works?

Your free 14-day trial with Guardey is based on our Basic plan. In our basic plan, all the alarms will only be available for yourself or your own company, and you manage the alarms in-house. We don’t need any payment information to start your trial, and you can invite as many users as you want.

The majority of SMEs don’t have an in-house IT department or a team of cyber security specialists. Therefore we also offer Guardey co-managed and Guardey custom. In both plans, you are able to connect Guardey to a preferred Guardy IT partner or, of course, your own IT partner.

They can semi or fully manage the alarms and the health of your infrastructure so that you can focus on your business.

After your 14 days of the free trial, you can decide if you want to continue with a paid plan. Upgrading during your trial period means you stop your trial and upgrade to a paid plan. You need a verified payment method to upgrade.

How can I pay after the trial period?

We don’t ask for any payment information to start your trial.

If you want to upgrade during or after your free trial to a paid plan, you can use one of the below payment methods:

  1. Credit cards (Visa, MasterCard, American Express, Maestro, PostePay, Cartes Bancaires)
  2. PayPal
  3. Direct Debit (iDeal SEPA)
Can I up- or downgrade to a different plan?

Yes you can! You can always upgrade immediately and costs are calculated pro-rata on your next invoice. A downgrade will be effective from your next payment period.

Want to ask more questions?
Get a personal demo

Get the latest resources & news, delivered directly to your inbox.

Anouk ter Harmsel
FREE 14-DAY TRIAL

Let's protect your business!

  • Try completely risk free
  • 24/7 support
Start 14-day free trial
Hey, wait!

Before you go, let us offer you a free 14-day trial.