Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Read our experts' top cyber security tips for 2021 - Check out our blog.

Overview

Safeguard critical data and assets against the latest threats

By infecting computer systems and stealing or destroying data, malware, such as viruses, worms, trojans, spyware and ransomware, is an increasing threat to your business’s cyber security.

Over a third of identified breaches are reported to involve malware, making it important to have appropriate controls in place to detect and respond to attacks before they cause significant damage.

Types

Common types of malware

Virus

A virus is a form of malware that attaches itself to macro-enabled documents and programs in order to infect files and move from host to host.

Worm

A worm compromises hosts by exploiting software vulnerabilities and spreads by replicating itself without human interaction or the need to attach itself to any other program.

Trojan

Trojans, or Trojan horses, are forms of malware that disguise themselves as legitimate software to trick users into executing them on target systems.

Spyware

Spyware secretly installs itself on computers and collects information about its hosts, such as web browsing activity and keystroke logs.

Adware

Adware is a type of program designed to display targeted advertising, which can be used maliciously to swamp users with unwanted ads and popups. Malvertising can also be used to inject malware-laden ads into legitimate advertising networks.

Ransomware

Ransomware is a form of malware designed to cause widespread disruption by infecting multiple systems on a network, locking down machines and demanding a ransom for their return or decryption.

Fileless malware

Fileless malware, or memory-resident malware, writes itself directly onto a computer’s memory to help evade detection and maximise dwell time.

Crypto-malware

Crypto-malware, the malware behind cryptojacking, is secretly installed onto unsuspecting hosts through phishing or browser-based script injection in order to harness computer processing power for the purpose of mining cryptocurrency.

Hybrid malware

The majority of malware-based threats display a wide variety of characteristics, making it difficult to classify them within a single category.

Polymorphic malware

Many types of malware can also be polymorphic – capable of constantly changing their characteristics to avoid detection by signature-based antivirus and antimalware solutions.

Ransomware

The rise of ransomware

Ransomware attacks, in particular, have increased rapidly in recent times and are now a ubiquitous threat to all organisations. By spreading quickly, locking down files and demanding a ransom for their decryption, ransomware is capable of causing significant disruption in a matter of minutes.

The WannaCry ransomware outbreak is just one high profile example of an attack that caused widespread disruption, affecting over 200,000 organisations in 150 countries. Cybercriminals can instigate attacks like these using basic and easily accessible components, highlighting the need for organisations to keep software patched, improve employee cyber awareness and detect malicious activity in its infancy.

A laptop that has been locked due to ransomware

Security assessments

Identify and address vulnerabilities

The fast-evolving digital landscape means that new vulnerabilities, and new exploits designed to take advantage of them, appear on a daily basis. One of the most effective ways to stay on top of the latest threats is to perform regular security testing.

As a provider of CREST-approved penetration testing as well as vulnerability assessment, social engineering and red teaming services, Redscan’s ethical hacking team has extensive experience of assessing organisations’ technology, personnel and processes against the latest attack techniques and helping organisations to address them.

ThreatDetect™ MDR

Proactive network and endpoint monitoring to detect early signs of attack

Firewalls and antivirus software are unable to comprehensively defend against the latest types of memory-resident and polymorphic malware.

ThreatDetect™, Redscan’s award-winning Managed Detection and Response service, provides round-the-clock security monitoring for a cost-effective monthly subscription.

The service combines certified security professionals, leading detection technologies and cutting-edge threat intelligence to hunt for malware and other cyber threats and help quickly shut them down.

ThreatDetect MDR

Challenges

Other security challenges

Our Services

Our award-winning services

Redscan’s security services are designed to provide the vital assistance needed to make tangible improvements to your organisation’s cyber security posture.

ThreatDetect MDR

Managed Detection and Response

Award-winning support to rapidly detect and respond to the latest threats 24/7

Read more

Assessment Services

Specialist engagements to uncover and address hidden cyber security risks

Read more
A person choosing from a range of Managed Security Services

Managed Security Services

Expert help to manage and monitor your choice of security technologies

Read more

Get in touch

Complete the form for a prompt response from our team.

I prefer to be contacted by:
View our privacy policy

Resources

Discover our latest content and resources

From the blog
From the blog Case studies Latest news
27th January 2021
Fraud reaching epidemic levels in UK, new report says
A new report has stated that fraud is now at epidemic levels in the UK and it should be recognised as a national security issue. This is due to the high levels of credit card, identity and cyber-fraud which costs up to £190bn a year.  
26th January 2021
Active NHS COVID-19 vaccination phishing attack underway
A phishing campaign pretending to be from the NHS is currently active. The phishing emails purport to alert recipients they are eligible to receive the COVID-19 vaccine.  
22nd January 2021
Redscan in the News: BBC coverage
Some of the laptops given out to vulnerable children to support home working in the UK have been found to contain Gamarue malware. Read more on this story in BBC News, including comments from Head of Threat Intelligence George Glass.
18th January 2021
Ransomware attacks to blame for half of healthcare data breaches
New research shows almost half of all data breaches in hospitals and the healthcare sector are due to ransomware attacks in which a 'double extortion' method is used.