{"id":724,"date":"2022-03-21T15:35:55","date_gmt":"2022-03-21T14:35:55","guid":{"rendered":"https:\/\/www.susii.nrw\/what-happened\/viruses-and-trojans-in-the-enterprise\/"},"modified":"2022-04-22T11:05:09","modified_gmt":"2022-04-22T09:05:09","slug":"viruses-trojans-enterprise","status":"publish","type":"page","link":"https:\/\/www.susii.nrw\/en\/first-aid\/viruses-trojans-enterprise\/","title":{"rendered":"Viruses and Trojans in the enterprise"},"content":{"rendered":"\n<p class=\"has-text-align-center su-page-intro has-black-color has-text-color\">Companies should be particularly sensitive to viruses and Trojans and identify potential economic damage.<\/p>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-person su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7240\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Inform system administrator<\/h2><div id=\"ac-7240\" class=\"c-accordion__content\">\n<p>If you find a virus or Trojan on your company computer, you should immediately inform your system administrator and disconnect the device from the network. If you do not report the incident internally, your company is at risk of further damage, which you are usually unable to assess. Viruses and Trojans can spread from your device to other devices and, for example, forward company data to third parties.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-search su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7241\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Check system, determine damage<\/h2><div id=\"ac-7241\" class=\"c-accordion__content\">\n<p>Organizations should perform a detailed system scan after a virus or Trojan is found on their network and determine if other devices are also affected. If you don&#8217;t have the expertise internally, then get external help, e.g. via specialized experts from your anti-virus vendor or a provider specializing in computer forensics. Pay particular attention to whether the viruses or Trojans have infected systems with sensitive data or services. This includes business and customer data, possible patents or control systems in production.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-record-voice-over su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7242\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Report damage<\/h2><div id=\"ac-7242\" class=\"c-accordion__content\">\n<p>If you suspect that you have suffered economic damage, you should contact the Central Contact Point for Cybercrime at the NRW State Criminal Police Office.&nbsp;<\/p>\n\n\n\n<p>The NRW Landeskriminalamt&#8217;s Single Point of Contact for Cybercrime is available around the clock:&nbsp;<\/p>\n\n\n\n<p><strong>Single Point of Contact<\/strong><br>Email: cybercrime.lka@polizei.nrw.de&nbsp;<br>Telephone: +49 211 939-4040<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-save su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7243\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Secure evidence<\/h2><div id=\"ac-7243\" class=\"c-accordion__content\">\n<p>Do <strong>not make any independent attempts<\/strong> to remove the malicious software at first. Only in this way is it possible for the police to secure evidence and initiate investigations. The police experts will give you further recommendations for action. In general, you should additionally involve external experts in the event of a virus or Trojan attack in your company.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-help su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7244\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Discovering the cause<\/h2><div id=\"ac-7244\" class=\"c-accordion__content\">\n<p>After a virus or Trojan detection in your company, be sure to analyze the cause and identify possible vulnerabilities in your system.&nbsp;<\/p>\n\n\n\n<p>Change all important passwords, e.g. to SAP systems, to data backup or to possible control systems.&nbsp;<\/p>\n\n\n\n<p>Internally, check your processes and security settings, eliminate possible vulnerabilities.&nbsp;<\/p>\n\n\n\n<p>Don&#8217;t neglect IT security training and awareness for your employees.&nbsp;<\/p>\n\n\n\n<p>Cyber criminals often look for the weakest link in companies, which mean this topic affects each and every member of staff.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-link su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7245\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Related links<\/h2><div id=\"ac-7245\" class=\"c-accordion__content\">\n<p>Botfrei.de:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.botfree.eu\/en\/tools\/virus-scanners.html\" data-type=\"URL\" data-id=\"https:\/\/www.botfree.eu\/en\/tools\/virus-scanners.html\" target=\"_blank\">Free and subscription-based virus scanners<\/a><br>BSI for Citizens:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bsi-fuer-buerger.de\/BSIFB\/DE\/Risiken\/Schadprogramme\/Viren\/viren_node.html\" target=\"_blank\">Info-Seite zu Viren\u00a0<\/a><br>Botfrei.de:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/blog.botfrei.de\/2016\/03\/das-schwaechste-glied\/\" target=\"_blank\">Das schw\u00e4chste Glied<\/a><br>Avira:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.avira.com\/en\/security-wordbook\" data-type=\"URL\" data-id=\"https:\/\/www.avira.com\/en\/security-wordbook\" target=\"_blank\">Virus Glossary<\/a><br>Virustotal:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/virustotal.com\/en\/\" data-type=\"URL\" data-id=\"https:\/\/virustotal.com\/en\/\" target=\"_blank\">Examine data and websites<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Companies should be particularly sensitive to viruses and Trojans and identify potential economic damage.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":704,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/724"}],"collection":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/comments?post=724"}],"version-history":[{"count":2,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/724\/revisions"}],"predecessor-version":[{"id":815,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/724\/revisions\/815"}],"up":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/704"}],"wp:attachment":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/media?parent=724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}