These aren’t the security threats you’re looking for

Which of these security threats are invisible to a computer’s operating system?

A) Spyware

B) Rootkit

C) Phishing

D) Worm

E) Jedi

The answer: B) Rootkit

A rootkit is designed to be stealthy. This stealth may hide in the operating system as a file that appears to be legitimate, or the threat could become part of the kernel and effectively be invisible to the operating system.

Want to know more? Watch “Security Awareness.”

When training your end user community, there are a number of security concerns that must be considered. In this video, you’ll learn which user habits, threat prevention techniques, and business policies should be implemented to keep everyone’s data as safe as possible.