The Battle of the Botnets and How It Affects Your Business

By | Jun 20, 2012

The term botnet is popular in the virus-writing world, but for businesses it's an unfamiliar term. Hackers express their dislike for company policy by bringing down the company website using viruses, Trojan horses, and denial-of-service attacks. Bringing down popular websites has made the news, but the way the hackers bring down the sites is not well known.

Bots, networks of infected computers, are used to perform a denial-of-service on these websites. The malicious code floods a server with spoofed traffic and renders the server unable to handle regular traffic. Unknown to people who have a virus installed on their computer, they participate in bringing down these servers. These attacks can be a problem for businesses that allow employees to browse the Internet, because a virus can also infect a business computer, giving control to a hacker, unbeknownst to the computer user and the IT manager.

The Danger of Botnets to Midsize Businesses

A virus takes control of the user's computer behind the scenes, so even while an employee works, the virus can be controlled by the hacker. The software lays dormant until the virus creator directs the computer to join other infected computers in sending commands to bring down the remote network, making the infected computer part of a botnet. The user is unaware of the problem except for more bandwidth usage that might slow down the user's Internet connection.

According to Computerworld, 5 million computers were infected during the first quarter of 2012. Bots have cost businesses thousands of dollars in protection software and the cost associated with cleaning up the software installed on the business computers.

Fighting Botnets

To reduce the number of virus attacks on US businesses, the federal government is helping to eliminate botnets by using "listening" techniques to warn computer users when their machine has been infected by malware. In addition, it is working with private companies to educate business owners and to organize programs in which businesses can share information on particular viruses and best practices for preventing and getting rid of them.

The first step in ensuring corporate computers are safe is antivirus software installed on the computer. In addition, network admins should update their virus definition files regularly. The second step in protecting computers is through the installation of firewall software. Firewall software is installed by default on a Windows computer, but most corporate IT managers prefer to install firewall software on the main router used to connect the company to the Internet. The length of a password can greatly increase the security of the website, internal network, and protect the company documentation.

This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet. Like us on Facebook. Follow us on Twitter.

IBM Solution Security & Resiliency

IBM's IT security expertise can help medium-sized businesses develop, implement and maintain comprehensive strategies to combat ever-evolving security threats without increasing complexity, cost, or resources required for administration.

Learn More »

More on This Topic

IT Security Needed More Than Ever For SMEs

By Daniel Newman on Oct 29, 2015
It’s hardly a secret when a large corporation gets hacked—it’s the opposite, actually. News of controversies and scandals for big business spreads quickly (like the recent Target and Ashley Madison data breaches). Just because they sometimes don’t make the front ...