Trend Micro

Enjoy Your Digital Life Safely Learn more

Top Five Reasons Not to Skimp on Security

Cutting corners doesn't pay.

1. Cutting corners doesn’t pay

Whether it’s consumer or enterprise security there is one bottom line: there is no point in cutting corners when it comes to security. The ‘it won’t happen to me’ mentality is a recipe for disaster. The body of evidence and expert opinion in the security industry all points to one thing: everybody and every business is at risk: From the data in your home computer or phone to that in your business devices, hackers make no distinctions. Ransomware and malware targets anybody and everybody. There is no such thing as a safe partial solution. The only way to seamless protection is through a complete security and privacy solution.

2. Ransomware - it costs

Global leader in security software, Trend Micro says Ransomware is growing - and rapidly. It targets consumers and businesses. Victims of ransomware find their files (photos, videos and office files) encrypted while a ransom note covers their screen demanding payment. If they don’t pay on time, the one key to unlock the files gets destroyed. It’s a growing problem in Australia and New Zealand where variations of the threat are thriving. In Q1 2015, Australia was ranked number two for ransomware infections. The FBI said it received 992 CryptoWall complaints from April 2014 to June 2015, representing total losses of $18 million — and that is just reported cases. Because criminals are finding this scheme lucrative, hackers will continue to work on producing virus variants that are harder to detect and decrypt.

3. Potentially unwanted application or applications (PUAs)

PUAs are applications installed on a mobile device or a computer that may pose high risk or have untoward impact on user security and privacy. They may also consume high amounts of computing resources. They may be unwanted by the user even if they are installed with users' consent.

Trend Micro says PUAs can behave like the following:

Bundling – The primary application that installed the additional applications often tricks users during the installation process with options that allow the installation of the bundled software.

Advertising – displays excessive advertisements, causing interruption or annoyance to users.

Information collection – applications that collect information without users' consent.

Other unwanted behaviour includes exaggerated or bogus notifications; a lack of control for users; running of unwanted processes or applications that consume computing resources; providing an unconventional way of uninstalling the application.

4. Banking malware

Companies are finding it tough to keep out new types of banking malware which continue to get better following the bar-raising threat known as Zeus. The malicious programs all aim to secretly steal credentials for online bank accounts with some specialising in making large, unauthorized wire transfers from businesses using the ACH (Automated Clearing House) system. A study by the firm, SecurityScorecard, which specialises in tracking companies risk of intrusion, found more than 4700 organisations which were infected by some type of advanced banking malware. It’s insidious. news.com.au reported on 13/05/14 that, “1-in-5 Australians have been victims of identity crime with computer hacking, online banking and shopping to blame. The amounts lost ranged from a few dollars to a staggering $310,000. The first indication anything was wrong usually was when they received their bank account statement.”

5. Mobile malware

Consider these facts from Trend Micro: There are now 10.6 million malicious and high-risk apps threatening mobile devices; 1 in 10 mobile users believe they have downloaded a malicious app to their device. Over 40 per cent of respondents to a Trend Micro poll in February 2015 had used their device for shopping or banking at least once in the past month. That’s why the greatest risk to your digital security could be in your pocket or your bag.

And this is just the tip of the iceberg. To help consumers combat malware, Trend Micro continues to focus on making everyone’s digital lives easier and safer. To offer consumers optimal protection, the global leader in security software has a bevy of suites including Trend Micro Security 10 – a security and privacy solution fully compatible with Microsoft Windows 10.

The latest version’s security features are simple to use and provide state-of-the-art protection for consumers’ data. They allow users to engage safely and securely online in today’s evolving, threat-infested environment. Trend Micro Security 10 provides protection on many devices and operating systems. It protects against exposing private information and data-theft. With the growing number of malicious threats, breaches, and hacks in the wild, you need a product like Trend Micro Security 10 to be safe online.

Don’t be a fool and risk everything: be secure.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

PC World Staff

PC World
Show Comments

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?