Skip to the content

Cyber Awareness Month 


Root in computer terms relates to the core of the machine, the highest level of admin and access and another version of Malware, however, this one needs to be called out especially as it is fundamentally designed to be invisible.

They can sit there for many days/weeks/months/years, simply waiting until you and your device become useful to the attacker.

Find out why:

  • Keep track of system process
  • Anti-malware is important
  • Quality firewalls detect malicious comms!

More Useful Guides


Managed Security Services: What you need to know


Protect your Data With Sophos MTR Flex


Sophos Managed Threat Response (MTR)