Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Learn how to validate the effectiveness of your cyber security controls. Join our webinar on September 8th.

Overview

Safeguard critical data and assets against the latest threats

By infecting computer systems and stealing or destroying data, malware, such as viruses, worms, trojans, spyware and ransomware, is an increasing threat to your business’s cyber security.

Over a third of identified breaches are reported to involve malware, making it important to have appropriate controls in place to detect and respond to attacks before they cause significant damage.

Types

Common types of malware

Virus

A virus is a form of malware that attaches itself to macro-enabled documents and programs in order to infect files and move from host to host.

Worm

A worm compromises hosts by exploiting software vulnerabilities and spreads by replicating itself without human interaction or the need to attach itself to any other program.

Trojan

Trojans, or Trojan horses, are forms of malware that disguise themselves as legitimate software to trick users into executing them on target systems.

Spyware

Spyware secretly installs itself on computers and collects information about its hosts, such as web browsing activity and keystroke logs.

Adware

Adware is a type of program designed to display targeted advertising, which can be used maliciously to swamp users with unwanted ads and popups. Malvertising can also be used to inject malware-laden ads into legitimate advertising networks.

Ransomware

Ransomware is a form of malware designed to cause widespread disruption by infecting multiple systems on a network, locking down machines and demanding a ransom for their return or decryption.

Fileless malware

Fileless malware, or memory-resident malware, writes itself directly onto a computer’s memory to help evade detection and maximise dwell time.

Crypto-malware

Crypto-malware, the malware behind cryptojacking, is secretly installed onto unsuspecting hosts through phishing or browser-based script injection in order to harness computer processing power for the purpose of mining cryptocurrency.

Hybrid malware

The majority of malware-based threats display a wide variety of characteristics, making it difficult to classify them within a single category.

Polymorphic malware

Many types of malware can also be polymorphic – capable of constantly changing their characteristics to avoid detection by signature-based antivirus and antimalware solutions.

Ransomware

The rise of ransomware

Ransomware attacks, in particular, have increased rapidly in recent times and are now a ubiquitous threat to all organisations. By spreading quickly, locking down files and demanding a ransom for their decryption, ransomware is capable of causing significant disruption in a matter of minutes.

The WannaCry ransomware outbreak is just one high profile example of an attack that caused widespread disruption, affecting over 200,000 organisations in 150 countries. Cybercriminals can instigate attacks like these using basic and easily accessible components, highlighting the need for organisations to keep software patched, improve employee cyber awareness and detect malicious activity in its infancy.

A laptop that has been locked due to ransomware

Security assessments

Identify and address vulnerabilities

The fast-evolving digital landscape means that new vulnerabilities, and new exploits designed to take advantage of them, appear on a daily basis. One of the most effective ways to stay on top of the latest threats is to perform regular security testing.

As a provider of CREST-approved penetration testing as well as vulnerability assessment, social engineering and red teaming services, Redscan’s ethical hacking team has extensive experience of assessing organisations’ technology, personnel and processes against the latest attack techniques and helping organisations to address them.

ThreatDetect™ MDR

Proactive network and endpoint monitoring to detect early signs of attack

Firewalls and antivirus software are unable to comprehensively defend against the latest types of memory-resident and polymorphic malware.

ThreatDetect™, Redscan’s award-winning Managed Detection and Response service, provides round-the-clock security monitoring for a cost-effective monthly subscription.

The service combines certified security professionals, leading detection technologies and cutting-edge threat intelligence to hunt for malware and other cyber threats and help quickly shut them down.

ThreatDetect MDR

Challenges

Other security challenges

Our Services

Our award-winning services

Redscan’s security services are designed to provide the vital assistance needed to make tangible improvements to your organisation’s cyber security posture.

ThreatDetect MDR

Managed Detection and Response

Award-winning support to rapidly detect and respond to the latest threats 24/7

Read more

Assessment Services

Specialist engagements to uncover and address hidden cyber security risks

Read more
A person choosing from a range of Managed Security Services

Managed Security Services

Expert help to manage and monitor your choice of security technologies

Read more

Get in touch

Complete the form for a prompt response from our team.

I prefer to be contacted by:
View our privacy policy

Resources

Discover our latest content and resources

From the blog
From the blog Case studies Latest news
5th August 2020
INTERPOL assessment of Covid-19 impact shows cybercriminals shift focus from small to large organisations
INTERPOL has identified that COVID-19 has led to a significant change in focus by cybercriminals from individuals and small businesses to government, major corporations and critical infrastructure.  It has also stated that a further increase in cybercrime is very likely in the near future.    
4th August 2020
Covid-19 pandemic led to an increase in cyber-attacks for most UK organisations
Recent research has identified that 92% of organisations in the UK saw an increase in cyber-attacks due to Covid-19. The three top challenges were: identifying new personal computing devices on the network, overloaded VPN capacity issues and increased security risks from video conferencing.
28th July 2020
State of security across universities FoI report
We sent FoI requests to 134 UK universities to understand how well prepared they are to protect staff, students and vital research against cyber threats. The results painted a mixed picture. Read our report here.
20th July 2020
UK is the second most targeted country for “serious” cyber-attacks
New research suggests that the UK is the second most targeted country for “serious” cyber-attacks, defined as ones which target government agencies, defence and high-tech companies.