SoCen Logo

Southern & Central Utah's FASTEST
Internet Service Provider

 (888) 826-4211  Contact Us  My Account

Virus & Malicious Software Removal

A computer virus can really ruin your day. Lucky for you, we are the experts in malicious software removal! The number one computer repair is virus removal, but not all repair companies are created equal. Many companies will simply run a virus scan and be done. Not only do we run 3 different scans, but we also check your registry and system files manually to ensure proper removal. We do everything we can to make sure your data has not been lost or damaged by the virus.

Repair Services

FiBERlink Pricing applies to South Central Communications members who subscribe to our Broadband Internet service.
Virus Removal
Removal of Malicious Software including Spyware, Malware, Trojans, and Rootkits.
$49 $69
Trend Micro Antivirus Software (12 month license)
Install antivirus software
$79 $79

Viruses & Malicious Software!

A Tech Medics Tech Notes Article

What are they?

Many people use the terms Virus and Malware (malicious software) interchangeably. However, viruses are considered a type of malware, whereas malware is an all-encompassing term. Malicious software is any kind of hostile, invasive or annoying software or code. Malicious Software includes computer viruses, worms, trojan horses, rootkits, backdoors, spyware, adware, keyloggers, botnets and scareware or ransomware.

So what's the difference between them?

  • Virus - A program embedded in to an executable file (for instance an email or music file) that, when ran, causes the infection to spread to other executable files. They may also contain a "payload" that will perform other malicious actions.
  • Worm - A program that actively spreads itself throughout your computer and network automatically. You do not need to open a program to activate it, it is automated. Just like a virus, it may carry other malicious payloads.
  • Trojan Horses - A trojan is malicious software that is disguised as something else, for instance a downloaded game from the internet or a toolbar; or it could simply be bundled in with a legitimate program.
  • Rootkits - Programs that embed and disguise themselves in your core system files. Rootkits are notoriously difficult to remove because they tend to attach themselves to files that are necessary for your computer to function.
  • Backdoors - These are programs that create a way for "hackers" or other malware to infect your computer easily by bypassing any existing security measures.
  • Spyware - This is one of the most common types of malware and can take on numerous forms. It can redirect your web browser, keep track of the web pages you visit to sell to marketing firms or even collect your personal usernames, passwords, bank data and account numbers.
  • Adware - Adware typically takes on the form of pop-ups. This is more of a nuisance software than anything; however the presence of adware can often be a sign of a more serious problem.
  • Keyloggers - These are programs that log the keystrokes of your keyboard. Doing this allows the program to know what you are typing which can reveal encrypted passwords.
  • Botnets - A botnet basically turns your computer in to a "zombie computer". Your system will work in conjunction with other computers on the botnet and will be used to distribute malicious software.
  • Ransomware/Scareware - This is the type of program that many find the most annoying and convincing. Ransomware is a program that takes your computer for "ransom" and demands that you pay a certain fee to regain the use of your system. The most common variety home users see is a fake antivirus. You will see a pop-up on your screen that looks like a legitimate antivirus program stating you have hundreds of infected files and you can pay $X amount to remove them. If you do pay the amount, not only will it NOT fix your problem, but you will have been charged that initial fee, plus your credit card information will be sold and used.

Why are they made?

Malware can be made for a variety of reasons. Some are made just for fun to annoy you, but the most common reason is money! The use of malware allows marketing companies to gather targeted information for advertising. Other virus companies steal your money directly by acquiring your bank and credit card information.

How do you get them?

Though most users believe they are being safe on the internet, 9 times out of 10 it is the user that installed the virus on their computer. A lot of malware can be installed by accident by installing a legitimate program, but a malicious application came bundled in. Many viruses come from installing "fun" products on the web such as toolbars, screensavers, games and torrents that you didn't scan for viruses before installing. It is important to ONLY download programs for trusted sources.

Also, only open email from people you know and only if it makes sense for them to be sending you that email. Many infections come from hijacked email accounts that send out emails with infected files attached or links that lead to infected sites or programs.

It is also possible to be infected by simply visiting a website. There are security vulnerabilities in many of the programs you use daily; that is why it is important to keep your media applications, such as Flash Player and Java, up to date. It is also important to have a good, up-to-date anti-virus program installed on your computer and any other computers on your network.

South Central Communications is the Internet service provider for:

Alton, Angle, Antimony, Apple Valley, Beaver, Beryl, Bicknell, Boulder, Brian Head, Bryce Canyon, Burrville, Cane Beds, Canonville, Centennial Park, Circleville, Colorado City, Duck Creek, East Zion, Enoch, Enterprise, Escalante, Fish Lake, Fredonia, Fremont, Glendale, Gooseberry Mesa, Greenwich, Grover, Hatch, Henrieville , Hildale, Jacob Lake, Junction, Kaibab Band of Paiutes, Kanab, Kingston, Koosharem, Loa, Lyman, Marysvale, Milford, Minersville, Modena, Mt. Carmel, Newcastle, Orderville, Page, AZ, Panguitch, Paragonah , Parowan, Teasdale, Torrey, Tropic

Residential Internet Services

Local & Long Distance Phone
High Speed Internet
Cable TV
Computer Repair
Special Offers
Order Services

Business Internet Services

Local & Long Distance Phone
PBX Phone Systems
IP PBX Phone Systems
High Speed Internet
Dedicated Circuits
IT Support
Order Services

Your Account

Hosted PBX Phone Portal

Member Support

Tech Support
Speed Test
Bandwidth Calculator
Service Alerts

About Us

Contact Us
Company Information
Policies & Agreements
News Room

My Community

Community Rewards Program
Contributions & Donations

South Central Communications Office Locations

Escalante Office
45 North 100 West
P.O. Box 555
Escalante, UT 84726
(888) 826-4211
Cedar City Office
856 Sage Dr, Ste 302
Cedar City, UT 84720
Kanab Office
318 North 100 East
Kanab, UT 84741
(435) 644-2810

© South Central Communications SSL