Internet Security Check Tool

Get a quick assessment

It's free, private and safe!

Summary

Below is your internet security scan result

Malware Prevention

0
Failed
0
Passed

Web Protection

0
Failed
0
Passed

Web Filtering

0
Failed
0
Passed

0 / 10

.

Malware Prevention
Stop older known viruses
Test whether your security solution can stop the well-known virus before it can infect your system

THREAT DESCRIPTION

All antivirus engines should detect and block these very common viruses, whether delivered from a trusted or unknown CDN. If your users can download them, your security solution can not protect your system properly, especially the 0-day malwares
Prevent viruses from known malicious sites
Test whether your security solution can block the EICAR virus test file

THREAT DESCRIPTION

EICAR test file is a benign file which is used to test by all security solutions. Most network defenses easily block the download either by scanning the file and detecting the test pattern, or by blocking the destination based on reputation. If your users can download this, your security solution is very weak and can make your system vulnerable to attackers
Block a virus hidden in a zip file
Test whether your security solution can block the EICAR virus test file, which is zipped multiple times.

THREAT DESCRIPTION

EICAR test file is a benign file which is used to test by all security solutions. The test file is zipped using standard archives and contains multiple benign files along with the EICAR test file. If your users can download this, your security solution cannot block hidden threats in download files
Web Protection
Block threats in known malicious websites
Test whether your security solution can block an object hosted on a known malicious site. The compromised site is published by Google and this action does not actually download the malware

THREAT DESCRIPTION

Compromised sites are often the containers of many malicious objects. If your users access the resources on those sites, they can expose your system to external threats
Block a social network phishing
Test whether your users can access phishing sites which resemble today popular social network sites such as: Facebook, Twitter, Zalo, etc

THREAT DESCRIPTION

If your users can access these phishing sites, they can expose their account information to hackers. This can lead to leaking sensitive information and exposing access to your internal system
Block a payment-related phishing
Test whether your users can access phishing sites which contain fake payment portals such as: Internet Banking, Paypal, Master Card, etc

THREAT DESCRIPTION

If your users can access these phishing sites, they can lose payment information. Then hackers can take over their accounts and do illegal activities. Sometimes these accounts can be linked to company payments, which affects the operation of the whole business. Especially, these actions can make a huge negative impact on financial corporations
Block cryptocurrency mining sites
Test whether your security solution can block malicious sites which provide cryptocurrency mining scripts

THREAT DESCRIPTION

If your users can access these sites, their computers can be used as crypto miners which consume a lot of resources to operate. This can affect your network bandwidth, speed and their computers performance
Web Filtering
Block access to adult websites
Test whether your users can access to a well-known adult website
THREAT DESCRIPTION
If your users can visit adult websites, the company policies are bypassed. These sites act as common watering holes to propagate malware, and they might expose your company to litigation risk and your data to untrusted third parties
Block an executable (.exe) download
Test whether your users can download an executable file from a website with a good reputation that uses a Content Distribution Network (CDN) like Akamai or AWS

THREAT DESCRIPTION

Executable files are possible introductions of malware and other threats. If your users can freely download them, those can be starting points of attack. Therefore, your system should have a strong policy engine to limit executable files download. The file we use to test is calculator file (calc.exe) from Microsoft. Its md5 is 0975ee4bd09e87c94861f69e4aa44b7a
Block access to anonymizing websites
Test whether your users can access to an anonymizing website.
THREAT DESCRIPTION
If your users are using anonymizing, the company policies are bypassed. These anonymizers can open a backdoor for malware, expose your company to litigation risk, and expose your data to untrusted third parties.