• What is Cloud Antivirus?

Send somebody a link to this page
Your Name
Friend's Name
Recipient's Email
 Security code


Cloud Antivirus is a web-based data security service that provides users with 24 hour protection against malicious online activity. The growing popularity of cloud based antivirus services can be attributed to inclusive features such as rolling software updates and access to professional tech support. Outsourcing these activities also reduces on-site IT requirements.

How Does Cloud Based Antivirus Work?

Cloud based antivirus services are quick to set up and easy to maintain. First, software is installed on each computer that requires antivirus protection. Next, the powerful cloud based antivirus service connects to this software via the internet. Once connected, machine scans can take place and performance reports can be generated.

The major benefit to the user is therefore not only professional antivirus protection, but faster computer speeds due to the effectiveness of ‘bug reports’ that can outline performance issues.

Benefits of Cloud Antivirus

The broad benefits of cloud based antivirus services include virus detection and malware removal. Specialist support staff are typically on location to oversee software updates on behalf of the user, ensuring each client receives the highest relevant level of online protection at all times.

Users can expect to receive:

  • Weekly Reports
    Weekly security and patch reports help users to stay informed on the details of recent threats. The report will also outline how each threat was detected and prevented.
  • 24/7 Threat Detection
    The service provider will scan continuously for malicious online threats - computer speed and performance is not affected. Scanning also continues out of business hours, giving 24/7 protection.
  • Pricing Guarantees
    Prices are typically all inclusive. Users can expect to agree to a one off operational expenditure that covers the delivery of suitable antivirus services.

Spotting the Signs of Malware

Responsible companies that wish to protect sensitive data should take steps to detect and prevent malicious online activity. Where such steps have yet to be taken, symptoms of infection may become apparent.

Common symptoms of malware include:

  • Computer is slow to load web pages
  • Computer is slow to respond to commands
  • Appearance of strange files, programs, or desktop icons
  • Non-intentional emails are sent from the user’s email account
  • CPU usage is greater than usual (linked to regular freezing and crashing)

Common types of threat include:

  • Virus
    A virus may serve to either harvest data or harm the host machine. The virus spreads by attaching a copy of itself to a program with multi-user access. Many computers can be infected in a short time frame.
  • Malware
    This basic attack requires the target user to open a file (e.g. email attachment) that contains a hidden auto-install file. Once installed, the malware typically gathers and shares sensitive data.
  • Trojan Horse (Phishing Tactics)
    Phishing is a tactic that presents an urgent message from a seemingly trusted source. This type of attack relies on tricking the user to open a Trojan file containing malware.

All of the above examples rely on user activity to complete the malware installation process. However, worms are self replicating viruses that spread through automatic installation - i.e. user interaction is not required to complete the installation of the virus. The best solution is to detect and block the worm before the first instance of infection.

 Contact centre

 Contact Centre

 Call Us

Speak to Sector & Technical Experts

 0800 015 7299
 Customer IT Support
 0121 248 7932
 Live Chat

Want to talk to an advisor?
Click the chat button below