Skip links

Phishing Phriday #16 – The Role of Malware in Phishing

Read more about Malware In Phishing

Understanding the Impact of Malware in Phishing Attacks

Welcome to our latest blog post! Today, we’re delving into the critical topic of cybersecurity, specifically the roles of malware and phishing in compromising personal and organizational data security.

What is Malware?

Malware, or malicious software, encompasses any program designed to perform unauthorized, often harmful, actions on your computer system. This software disguises itself under the guise of legitimacy, tricking users into downloading or executing actions without realizing the potential harm. The primary aim of malware is to steal sensitive information or gain unauthorized access to computer systems, which could include email accounts, bank accounts, and other valuable digital assets.

The Common Gateway: Phishing

One of the prevalent methods through which malware is distributed is phishing. This technique often involves sending emails that appear to be from reputable sources but contain malicious links. When these links are clicked, they can lead to compromised websites or prompt downloads that appear benign but carry harmful payloads.

How Malware Spreads Through Phishing

When discussing how browsing works in its simplest form, consider this: every time you visit a website by typing its address, your computer requests and downloads the site’s content to display it to you. Malicious actors exploit this by embedding their malware into seemingly innocuous websites or disguising it within downloadable files like reports or free software.

The Risk of “Free” Software

The old adage “there’s no such thing as a free lunch” holds particularly true in the digital world. Free software may cost nothing monetarily but often comes with hidden costs such as adware, spyware, or worse. For example, some “free” software might offer functionalities similar to premium versions of well-known software but at a hidden cost to your privacy and security. These programs may install additional, undisclosed software that can perform dangerous actions like keystroke logging or remote system monitoring.

Advice for Small Business Owners

For small business owners, understanding and controlling what software is installed on your network is vital. Ensure that only necessary and trusted applications are used and consider restricting the ability to install software without proper vetting. Remember, the tools you provide your employees should be used as intended and not as a means to compromise your business’s operational security.


As we wrap up this episode, the takeaway is clear: always exercise caution with the links you click, the websites you visit, and the software you install. When in doubt, opting not to proceed is safer than risking a potential security breach. Always seek advice from IT professionals if you’re unsure about the security of a potential software download or website visit.

Thank you for tuning in, and we hope this discussion helps you better understand the critical importance of being vigilant in the face of malware and phishing threats. Stay safe and secure in your digital interactions!

Watch our most recent Phishing Phriday videos here

president tier 818x1024 1

Hi, I'm Jesse and I look forward to speaking with you.

An IT Support partner that you can trust.

I’m proud of the team we’ve assembled and the service they provide to our clients.  It’s because of them that we’re able to make a positive impact in our clients’ businesses and the communities we serve.

Our clients run businesses that depend on technology to operate but don’t have the expertise in-house to manage all the aspects of their Information Technology.  Our unique service delivery model is focused on a business first approach whereby we seek to understand what you’re trying to achieve, and how technology can help you move closer to those goals.  I’d love to connect with you to talk about how we might be able to help you improve the Stability, Security, Strategy, and Supportability of your network.