چگونه یک وب سایت آلوده، از طریق کسب و کار شما، بد افزار منتشر می کند

These incidents usually involve the temporary or permanent loss of business data, including that of customers. Under new EU GDPR laws, from May 2018 businesses will have to make these events public if the nature of the breach could have a negative impact on the subjects of the data.
The malware involved with these kind of incidents usually arrives because someone clicked on a link or an attachment in a phishing email.
We’ve stressed repeatedly all employees need to be on lookout for the red flags of a phishing email and you have to train employees continuously by sending them simulated phishing attacks.

But how does malware actually get onto your business PCs and networks?
You may believe that in order to get malware from an infected website, you actually have to go onto the site, download something and then run it.
Unfortunately, this is not true.
Infected sites, especially those deliberately used in phishing attacks, use “drive by downloads” to infect their targets. This means that files can begin downloading from the site as soon as you arrive on it, and they can run themselves when downloaded – all without you clicking on anything after making the decision to connect to the website.
How can a website do this?
They exploit outdated software on users’ devices. If you have any software, including your browser or operating system, that is out of date – a website can use something called an exploit kit to scan your device. If it finds any vulnerabilities, such as software that you haven’t updated, it can download files that will exploit that vulnerability.