{"id":2701,"date":"2018-11-26T07:46:02","date_gmt":"2018-11-26T12:46:02","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2701"},"modified":"2018-11-21T13:58:16","modified_gmt":"2018-11-21T18:58:16","slug":"how-to-avoid-getting-hit-by-drive-by-downloads","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/","title":{"rendered":"How to Avoid Getting Hit by Drive-by Downloads"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/download-illustration.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2702\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/download-illustration-300x200.jpg\" alt=\"download illustration\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/download-illustration-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/download-illustration-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/download-illustration-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/download-illustration.jpg 1254w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>As we near the end of 2018, <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> remains a top priority and significant cause of concern for businesses everywhere. Data breaches continue to occur at an alarming rate (e.g., the <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/facebook-data-breach-faq-5-things-you-should-know\/\" target=\"_blank\" rel=\"noopener\">recent Facebook breach<\/a> that affected almost 50 million users). As of November 2, the <a href=\"https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2018\/11\/2018-October-Data-Breach-Package.pdf\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Identity Theft Resource Center<\/a> had identified 1,027 breaches in the U.S. this year, exposing approximately 57.7 million records.<\/p>\n<p>Large and <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/\" target=\"_blank\" rel=\"noopener\">small businesses<\/a> alike must continue to take proactive steps to fend off cybercriminals and reduce their data breach risk level going into 2019. One strategy that <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/5-types-of-hackers-businesses-should-know-about\/\" target=\"_blank\" rel=\"noopener\">hackers<\/a> use to get past IT security defenses involves drive-by downloads, which can allow malicious code to infiltrate a computer or mobile device without the user even clicking on anything or realizing they\u2019ve been infected. Here\u2019s an overview of the essential things every business leader should know about this type of IT security threat.<\/p>\n<p><strong>How Drive-by Downloads Work<br \/>\n<\/strong>When you think of downloading something, you probably imagine yourself deliberately clicking on links and prompts. However, a malicious website doesn\u2019t need your approval to initiate a download. A drive-by download happens when you simply stop by\/\u201ddrive by\u201d a site and unintentionally download a virus or malware onto your computer or mobile device, according to <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/family-safety\/drive-by-download\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">McAfee<\/a>.<\/p>\n<p>These downloads typically exploit browsers, operating systems, or apps that have security flaws and\/or are out-of-date. Unlike a phishing campaign or other hacking tricks, it doesn\u2019t require the user to click on a suspicious link or file. The code is usually so small that you might not even notice it, McAfee explains. Once the code successfully downloads to your device, it will contact another computer and bring in more code to finish its job.<\/p>\n<p>Additionally, this code can lie in wait on otherwise normal looking web pages, although it does help to avoid going to sites that seem suspicious (e.g., file-sharing sites).<strong><\/p>\n<p>Steps You Can Take to Stop Drive-by Downloads<br \/>\n<\/strong>Fortunately, there are steps you can take to lower your chances of experiencing a drive-by download, according to <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/drive-by-download\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Kapersky Lab<\/a>. Here are just a few ways you can avoid this type of cyberattack:<\/p>\n<ul>\n<li>Make sure your browser and OS are up-to-date.<\/li>\n<li>Avoid installing an excessive amount of plug-ins and programs.<\/li>\n<li>Use an ad blocker, since drive-by downloads often occur via online ads.<\/li>\n<\/ul>\n<p>It also helps to have a <a href=\"https:\/\/www.stratospherenetworks.com\/content-filtering.html\" target=\"_blank\" rel=\"noopener\">content filtering solution<\/a> in place. On top of limiting employees\u2019 access to suspicious sites and boosting network protecting, content filtering can increase productivity.<\/p>\n<p>If you\u2019d like to know more about drive-by downloads or other types of cybersecurity threats and how to defend against them, our team of IT security experts can help. We work with a wide range of cybersecurity solutions from various vendors, which allows us to serve as a trusted advisor to clients seeking offerings that fit their specific business needs. Connect with us today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we near the end of 2018, cybersecurity remains a top priority and significant cause of concern for businesses everywhere. Data breaches continue to occur at an alarming rate (e.g., the recent Facebook breach that affected almost 50 million users). &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Drive-by Downloads: How to Avoid Them | Chicago IT Support<\/title>\n<meta name=\"description\" content=\"Drive-by downloads can open the door to cybercrime and cause a data breach at your company. Here\u2019s how they work and IT security strategies to prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Drive-by Downloads: How to Avoid Them | Chicago IT Support\" \/>\n<meta property=\"og:description\" content=\"Drive-by downloads can open the door to cybercrime and cause a data breach at your company. Here\u2019s how they work and IT security strategies to prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-26T12:46:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"How to Avoid Getting Hit by Drive-by Downloads\",\"datePublished\":\"2018-11-26T12:46:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/\"},\"wordCount\":491,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/\",\"name\":\"Drive-by Downloads: How to Avoid Them | Chicago IT Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2018-11-26T12:46:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Drive-by downloads can open the door to cybercrime and cause a data breach at your company. Here\u2019s how they work and IT security strategies to prevent them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Avoid Getting Hit by Drive-by Downloads\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"Drive-by Downloads: How to Avoid Them | Chicago IT Support","description":"Drive-by downloads can open the door to cybercrime and cause a data breach at your company. Here\u2019s how they work and IT security strategies to prevent them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/","og_locale":"en_US","og_type":"article","og_title":"Drive-by Downloads: How to Avoid Them | Chicago IT Support","og_description":"Drive-by downloads can open the door to cybercrime and cause a data breach at your company. Here\u2019s how they work and IT security strategies to prevent them.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2018-11-26T12:46:02+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"How to Avoid Getting Hit by Drive-by Downloads","datePublished":"2018-11-26T12:46:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/"},"wordCount":491,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/","name":"Drive-by Downloads: How to Avoid Them | Chicago IT Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2018-11-26T12:46:02+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Drive-by downloads can open the door to cybercrime and cause a data breach at your company. Here\u2019s how they work and IT security strategies to prevent them.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-avoid-getting-hit-by-drive-by-downloads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Avoid Getting Hit by Drive-by Downloads"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2701"}],"version-history":[{"count":1,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2701\/revisions"}],"predecessor-version":[{"id":2703,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2701\/revisions\/2703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}