secure

Need The Best IT Services In Colorado Springs?

Call Us Today!

(719) 355-2440

Published On: March 10, 2019 by Blake Schwank

Computer viruses have been around since the 1990s, and although the term is still frequently heard these days, the actual viruses themselves are largely relics of the past. Cyber threats however, are still very much a part of the modern picture and are often referred to simply as “viruses” because the word has become a catch-all for any type of security issue. The word became ingrained in the common narrative when it comes to all things technical, but what people are calling viruses today aren’t much like their counterparts of the past.

YouTube video
Computer viruses are programs that easily duplicate themselves using built-in self-replicating codes — in fact, those who created the first computer viruses were inspired by biological viruses that attacked a host and then proceeded to duplicate itself and move on to other hosts. Old-school viruses generally accessed computers via files users installed themselves — music files used to be common culprits when viruses were in their heyday. Many users never even knew they’d inadvertently installed a virus on their computer at the time because most of them remained dormant for a period of time before coming alive to wreak havoc.

Are Viruses Still Around

Strictly speaking, viruses no longer really exist. Original virus writers were mostly gunning for Microsoft, but innovations in security technology have pretty much rendered the old-school replicating code programs obsolete. Nonetheless, the word is still often heard in discussions of security issues. So what are they really talking about if they aren’t talking about viruses? And why are computer attacks still going on if viruses have reached dinosaur status?

So What’s Going On?

Chances are, they’re referencing Malware. Simply speaking, malware refers to software that’s designed for the purpose of accessing computers and causing disruptions and damage, often with the purpose of gaining access to sensitive financial information. It’s most commonly introduced via drive-by downloads that install themselves on your system automatically when you visit certain websites.

Malware comes in a variety of forms, shapes, and sizes, but the following are among the most common:

  • Ransomware — this particularly nasty software threatens to expose the user’s personal data to the public eye or block the user’s access to it until and unless the user pays a ransom to an undisclosed source. Incidents of ransomware have been increasing at a steady rate for the past several years.
  • Spyware — as its name implies, spyware gathers personal information via your computer without your knowledge.
  • Trojan Attacks — just like its historical counterpart, a Trojan horse is a malicious program designed to mislead users about its real intent. The often come in email attachments or fake advertisements on social media.

Please feel free to reach out to us for more information on computer security in Colorado Springs.

Certified and Verified Service-Disabled Veteran-Owned Small Business (SDVOSB)

Logo SDVOSB
Colorado Computer Support is a local IT company certified and verified service-disabled veteran-owned Small Business. When you use our IT services in Colorado Springs, you can be confident that you are dealing with a Colorado Springs company owned by a disabled veteran and that they will be able to provide you with the best possible IT support.
Skip to toolbar