Taking advantage of cloud services can greatly benefit any business in many ways.  However, we’ve noticed this idea growing among cloud users that they don’t have to worry about security because “it’s in the cloud”.  Unfortunately, trojans pose a significant threat to anyone using cloud services just as much as any user.

What is a Trojan?

A Trojan makes an obvious reference to the historic event from the Trojan War.  In the story, the Greeks defeated Troy by hiding a small force inside a large wooden horse that seemed like a gift from the Greeks after a long stalemate.  Once the Trojans moved the horse into the city, the Greeks inside slipped out and opened the gates from the inside, allowing the rest of their army to infiltrate and defeat the Trojans.

A Trojan in the digital world is very much the same thing.  It’s a delivery mechanism used to drop off malicious software without the user being aware of what’s happening.  That software could consist of anything from hijacking to spyware.  It doesn’t take much to pick up a Trojan.  Simply loading a website with an exploit on it can do the trick.

Trojans and Cloud Security

While cloud service providers do offer a good deal of security, the biggest factor contributing to the success of Trojans is users.  Once a Trojan has been triggered and the software installed, it simply waits for the user to sign in to critical services.  As you sign in, the Trojan grabs your credentials for websites and services you use.  This can include anything like email, banking sites, storage services, online backups, and more.  These credentials can be worth a great deal depending on what services they access.

Blocking Attacks from Trojans

For any service you use online, activate two-factor authentication (2FA) if it’s available.  Activating 2FA will require you to enter a code or approve the sign-in.  This code or approval will either come on another device like your phone or in your email.  This process adds an additional step to the sign-in process, but it has the potential to stop any unauthorized access immediately.

Additionally, some sort of antivirus should be installed on your devices.  Antivirus software can scan files as they’re downloaded and detect harmful files such as Trojans.  Traditional antivirus software depends on a virus signatures for comparison.  This means that the Trojan must have been detected in the past.  More advanced security software takes advantage of machine learning to look at what the file does and can potentially catch malicious files even if they’ve never been seen before.  Regardless, we recently discussed how to get free antivirus in an episode of Tech Tip Tuesday.

Ask For Help

We only discussed Trojans today.  Cyber threats include a lot more than just Trojans.  Plus, there’s a lot that goes into securing your data whether it’s stored locally or in the cloud.  Every client of Pit Crew IT Services can rest easy knowing that we’re making sure your entire network is secure and protected according to the latest best practices.  If you need help with security or any aspect of your IT solution, request a free consultation below, and we’ll help you rest easy too.

Get a FREE IT Consultation!

Start Now