Malware: How does it spread and what tools can stop it?

Insecure software is a constant threat to individuals and businesses. As cybercrime continues to evolve, understanding what malware is and how it works is essential to protecting your devices and data. In this article, we’ll go over an explanation of what malware is, the different types, and how it spreads. You’ll also learn about tools you can use to protect yourself, such as a malware scanner or malware checker, and discover how fraudulent email messages work and why malware is still a widespread problem.

Malware definition

Malware – short for malicious software – is a collective term for applications or software deliberately designed to damage or compromise an electronic device. It can steal sensitive and confidential information stored on the device or install malicious programs to spy on your online activities and, in some cases, even hold your device hostage.

Malware can infect all types of electronic devices including mobile phones, PCs, tablets, smart TVs and even gaming systems.

Malware – virus

Contrary to popular belief, not all malware is a virus. All viruses are malware, but not all types of malware are viruses. A virus spreads by inserting its code into other files or programs, replicating and then transmitting itself from one infected device to another.

If the malware does not use other programs to copy and spread itself, then it is technically not a virus. A malicious virus can spread not only to other programs on the same device, but also to other devices and users on the same network.

How the malware works

Malware works by infiltrating the system through various methods. The way malware works can vary depending on the type of malware, but its general goal is to compromise the security of your computer or network. Some types of malware corrupt files, others steal data, and some even lock your system until a ransom (ransomware) is paid.

The malware works by using tricks to prevent normal use of the device. A cybercriminal first gains access to your device through one or more different techniques – for example, a fraudulent email, an infected file, a system or software vulnerability, an infected USB flash drive, or a malicious website.

It will then take advantage of the situation by launching further cyber attacks, obtaining account credentials, collecting personal information for sale, selling access to computing resources, or extorting payments from victims.

Who can fall victim to malware?

Anyone can fall victim to a malware attack. Some people may be able to recognise certain ways in which cybercriminals try to target victims with malware, for example they may be able to recognise a phishing email. However, cybercriminals are sophisticated and are constantly evolving their methods to keep up with technology and security improvements.

Malware attacks also look and act differently depending on the type of malware. Someone who is the victim of a rootkit cyberattack, for example, may not even be aware of it because this type of malware is designed to hide for as long as possible and go unnoticed.

How malware spreads

Cybercriminals use several tactics to spread malware. A common method is email attachments or links, often called malwareemail scams. It is also through these scams that various types of viruses are often spread, which can infect a device and cause significant damage. Scam emails are designed to trick you into downloading or opening a malicious file.

Examples of these attacks are fake invoices, suspicious links or spoofed email addresses pretending to be from legitimate companies. Some examples of malware emails may look innocent at first glance, but when clicked can trigger an infection.

Another method involves compromised websites. To scan URLs and determine whether a website has been infected with malware, a website scanning tool – a malware website checker – can be used. Malicious websites often prompt users to download harmful software disguised as software updates or media files. Malware can also spread through networks, external drives, or unsecured downloads. Below you will find a complete list of the most common ways malware is spread.

  • Email: if your email has been infected, malware can trick your computer into sending emails with infected attachments or links to malicious websites. When the recipient opens the attachment or clicks on the link, the computer virus is installed on their computer and the cycle repeats.
  • Physical media: hackers can upload malware to USB flash drives and wait for unsuspecting victims to plug them into their computers. The virus is thus transferred from one computer to another. This technique is often used in corporate espionage.
  • Pop-up alerts: these include fake security alerts that trick you into downloading fake security software, which in some cases may be additional malware.
  • Vulnerabilities: a security flaw in the software could allow malware to gain unauthorised access to your computer, hardware or network.
  • Drive-by downloads: the unintentional downloading of software with or without the end user’s knowledge.
  • Elevated privileges: an attacker gains elevated access to a computer or network and then uses it to attack.
  • Homogeneity: if all systems use the same operating system and are connected to the same network, the risk of successfully spreading the worm to other computers increases.
  • Mixed threats: malware packages that combine features of multiple types of unwanted software, making them difficult to detect and stop because they can exploit different vulnerabilities.

Types of malware

It’s important to know the different types of malware attacks so you can protect yourself from being attacked.

1. Adware

Adware, short for “advertising-supported software”, displays unwanted and sometimes harmful advertising on a computer or mobile device screen, redirects search results to advertising websites and captures user data that can be sold to advertisers without the user’s consent. Not all adware is malware, some is legitimate and safe to use.
Users can often control the frequency of adware or what types of downloads they allow by managing pop-up controls and preferences in their web browsers or by using an ad blocker.

Did you know that…

Fireball made headlines in 2017 when an Israeli software company found it infected 250 million computers and a fifth of corporate networks worldwide. When Fireball affects your computer, it takes control of your browser. It turns your homepage into a fake search engine – Trotus – and inserts annoying adverts into every web page you visit. It will also prevent you from editing your browser settings.

2. Spyware

Spyware is a form of malicious software that hides on your device, monitors activity and steals sensitive information such as financial data, account information, login credentials and more. Spyware can spread by exploiting software vulnerabilities or can be secretly added to legitimate software.

Did you know that…

CoolWebSearch – exploited a security flaw in Internet Explorer to change its settings and send browsing data to its author.

Gator – this program, which usually comes with file-sharing software, monitors user preferences and activity while surfing the Internet and uses this information to serve specific ads.

3. Ransomware and crypto-malware

Ransomware is malicious software designed to lock users out of their system or prevent them from accessing data until they pay a ransom. Crypto-malware is a type of ransomware that encrypts a user’s files and requires payment by a certain deadline and often through digital currency such as Bitcoin. Ransomware has been a persistent threat to organizations in a variety of industries for many years.

Did you know that…

CryptoLocker is a form of malware used by cyber criminals to gain access to files on a system and encrypt them. Cybercriminals used social engineering tactics to trick employees into downloading the ransomware onto their computers, thereby infecting the network. Once downloaded, CryptoLocker displayed a ransom message offering to decrypt the data if paid in cash or Bitcoins by a set deadline.

4. Trojan horses

The Trojan disguises itself as legitimate software to trick you into running malware on your computer. Because it looks trustworthy, users download it, unknowingly allowing the malware to enter their device. Trojans themselves are the door. Unlike worms, they need a host to operate. Once a Trojan is installed on a device, hackers can use it to delete, modify or capture data, harvest data from the device as part of a botnet, spy on the device or gain access to the network.

Did you know that…

The TrickBot malware – first identified in 2016, is a Trojan developed and operated by sophisticated cybercrime actors. Originally designed as a Trojan to steal financial data, TrickBot has evolved into a multi-stage malware that provides a complete suite of tools to carry out a range of illicit cyber activities.

5. Worms

One of the most common types of malware, worms, spread across computer networks by exploiting operating system vulnerabilities. A worm is a stand-alone program that replicates itself and infects other computers without requiring action from anyone. Because worms can spread quickly, they are often used to execute a payload – a piece of code designed to damage a system. It can delete a file on the host system, encrypt data for a ransomware attack, steal information and create botnets.

Did you know that…

SQL Slammer was a well-known computer worm that did not use traditional distribution methods. Instead, it generated random IP addresses and distributed itself to them, searching for those that were not protected by antivirus software. Shortly after its attack in 2003, the result was more than 75,000 infected computers that unwittingly engaged in DDoS attacks on several major websites.

6. Viruses

A virus is a piece of code that is inserted into an application and executes when it runs. Once it enters the network, it can be used to steal sensitive data, launch DDoS attacks or carry out ransomware attacks. Viruses, which are usually spread through infected websites, file sharing or downloading email attachments, are dormant until the infected host file or program is activated. When this happens, viruses can replicate and spread through systems.

Did you know that…

Stuxnet – Stuxnet appeared in 2010 and is widely believed to have been developed by the US and Israeli governments to disrupt Iran’s nuclear programme. Spread via a USB stick, it targeted Siemens industrial control systems, causing centrifuges to fail and self-destruct at record speed. Stuxnet is believed to have infected more than 20,000 computers and destroyed a fifth of Iran’s nuclear centrifuges – setting back Iran’s programme by several years.

7. Keyloggers

A keylogger is a type of spyware that monitors user activity. Keyloggers can be used for legitimate purposes – for example, families using them to monitor their children’s online activities, or organisations using them to monitor employee activities. However, if keyloggers are installed for malicious purposes, they can be used to steal password data, banking information and other sensitive information. Keyloggers can be inserted into a system through phishing, social engineering or malicious file downloads.

Did you know that…

In 2017, a University of Iowa student was arrested for installing keyloggers on employee computers to steal login credentials to edit and change grades. The student was found guilty and sentenced to four months in prison.

8. Bots and botnets

A bot is a computer that has been infected with malware so that a hacker can control it remotely. The bot – sometimes called a zombie computer – can then be used for further attacks or become part of a collection of bots called a botnet. Botnets can involve millions of devices because they spread without detection. Botnets assist hackers in many malicious activities, including DDoS attacks, sending spam and phishing messages, and spreading other types of malware.

Did you know that…

Andromeda malware – The Andromeda botnet has been linked to 80 different types of malware. It grew to such proportions that at one point it was infecting a million new computers a month, spreading via social media, instant messaging, unsolicited emails, exploit kits and more. The operation was taken down in 2017 by the FBI, Europol’s European Cybercrime Centre and other institutions – but many computers continued to be infected.

9. Hybrids

Today, most malicious software is a combination of different types. It contains parts of Trojans and worms and occasionally a virus. Usually, the malicious program appears to the end user as a Trojan, but once launched, it attacks other victims over the network as a worm.

Did you know that…

In 2001, a malware developer calling himself “Lion” released a hybrid malware – a combination of a worm and a rootkit. Rootkits allow hackers to manipulate operating system files, while worms are powerful vectors for quickly spreading pieces of code. This malicious combination has wreaked havoc: it has caused damage to more than 10,000 Linux systems. The malware combining worm and rootkit was explicitly designed to exploit vulnerabilities in Linux systems.

10. Malware without files

Fileless malware is a type of malware that uses legitimate programs to infect your computer. It does not rely on files and leaves no trace, making it difficult to detect and remove. Fileless malware emerged in 2017 as a major type of attack, but many of these attack methods have been known for longer.

Without being stored in a file or installed directly on the computer, fileless infections go directly into memory and the malicious content never touches the hard drive. Increasingly, cybercriminals are turning to fileless malware as an effective alternative form of attack that is harder for traditional antivirus programs to detect due to the small footprint and lack of files to scan.

Did you know that…

Frodo, Number of the Beast and The Dark Avenger were the first examples of this type of malware.

What malware can cause – symptoms

If you notice any of the following signs, there may be malware on your device:

  1. Slow system performance: this may indicate that malicious code is consuming system resources. High CPU usage or overheating may also indicate background malware activity.
  2. Annoying ads and pop-ups:unwanted ads that appear on your screen are often the work of adware. These ads are not only annoying, but can also serve as gateways to other types of malicious code.
  3. System crashes and freezes: If you’re experiencing frequent system crashes or the dreaded “blue screen of death” (BSOD), it’s likely that malware is interfering with system processes and causing instability.
  4. Unexpected use of disk space: a sudden decrease in available disk space may indicate that malware is downloading malicious files to your hard drive without your permission.
  5. Unusual activity on the Internet:Watch out for unexpected spikes in data usage or connections to unknown external IP addresses. These may be indications that malware, such as Trojan horses or botnets, are communicating with the Command and Control (C&C) server.
  6. Changed browser settings: changes to your home page, default search engine or new browser extensions appearing without your knowledge may indicate malware that is hijacking your browser.
  7. Disabled security software: If you find that your antivirus or other security measures are disabled and you can’t activate them, it may be malware designed to weaken your defences.
  8. Ransom notes or blocked files: encrypted files with accompanying notes demanding payment of a ransom are a hallmark of ransomware, a particularly nasty type of malware.
  9. Subtle signs: some advanced types of malware can work without showing any obvious signs, quickly draining your device’s battery, sending emails on your behalf or displaying intermittent error messages.

It is very important to note that these symptoms are not definitive proof of malware infection. Alternative explanations may be at play, such as software incompatibility or hardware problems.If you suspect your system is infected, follow these three basic steps to remove the malware:

  1. Install the software cybersecurity software: Download and install trusted security software that can detect and remove malware.
  2. Run a system scan: run a full system scan using the security software.
  3. Change your passwords:Reset all passwords, including passwords for email, social media and bank accounts. It is also recommended to use multi-factor authentication, which adds an extra layer of security.

Malware – protecting and preventing attacks

By following these tips and deploying the right technology, you can improve your defences against malware threats, whether it’s for individual or organisational use.

  • Don’t click on suspicious links: whether it’s an email, a text message or a pop-up window, always be wary of links from untrusted sources.
  • Software updates: always keep your software up-to-date, including security software, to protect yourself from the latest types of malware.
  • Official app stores: download apps from official stores and check reviews and ratings before installing.
  • Regular backups: back up important data often. This can be invaluable in the event of a ransomware attack.
  • Only secure sites: Only visit secure websites whose web address begins with https://. (The letter S stands for secured.)

How to remove malware

Follow these six steps to remove infectious software on your computer.

Step 1: Disconnect from the Internet

Disconnecting from the internet will prevent more of your data from being sent to the malware server or the malware from spreading further.

Step 2: Go to safe mode

If the malware is set to load automatically, this will prevent it from loading, making it easier to remove.

To enter safe mode:

  1. Restart your computer.
  2. When the login screen appears, hold down the Shift key and select Power → Restart.
  3. After restarting your computer, on the “Select an option” screen, select Troubleshooting → Advanced Options → Startup Settings.
  4. In the next window, click Restart and wait for the next screen to appear.
  5. A menu will appear with numbered launch options. Select number 4 or F4 to start the computer in safe mode.

Step 3: Check the activity monitor for malicious apps

If you know you’ve installed a suspicious update or app, close the app if it’s running.

The Activity Monitor displays the processes that are running on your computer, so you can see how they affect your computer’s activity and performance.

Check for malicious applications:

  1. Open the Resource Monitor application.
  2. Find the task
  3. Select “End Process”

Step 4: Run the malware scanner

Fortunately, malware scanners can remove many standard infections. However, remember that if you already have an antivirus program active on your computer, you should use a different scanner for this malware scan, as your current antivirus software may not initially detect malware.

Step 5: Fix your web browser

The malware is likely to change the home page of your web browser and re-infect your computer. Check your homepage and connection settings using the steps below for common browsers.

Verify your home page in Chrome:

  1. In the top right corner of Chrome, click “More” and then “Settings”.
  2. Select the drop-down menu under “Search engine”.
  3. Check your default homepage.

Step 6: Clear the cache

After verifying the home page settings, it is necessary to clear the browser cache. Follow these steps to learn how to clear your Chrome and Internet Explorer cache.

Clear the cache in Chrome:

  1. Search for History
  2. Select “Delete browsing data”.
  3. In the Time Range drop-down menu, select the “All Time” option.
  4. Select the “Delete data” option.

Podcast #3: Generation Z and their view on work, technology and values

The values and attitudes of Generation Z are bringing about changes in the work environment and in social relations. In the third episode of our Na Vlne Kodu (in English “On the Wave of Code”) podcast, we dive into the world of Zoomers through our guest Jakub Novak from msg life Slovakia.

In today’s episode, we take a closer look at Generation Z, who grew up with mobile phones in their hands and the internet as an integral part of their lives. Members of Generation Z are just entering the workforce and are dramatically changing consumer behaviour and social trends. They are bringing new perspectives on technology, culture and the work environment, which is changing the way the rest of us operate. And how does this generation perceive the world? Are Zoomers really that different from those of us who grew up without TikTok and other social media? Our guest today is Jakub Novak from msg life Slovakia, who is a representative of Gen Z. Today, he will help us better understand their worldview and also answer the question of how to collaborate effectively across generations. The interview is conducted by our HR manager Ivana Hricova. We wish you a pleasant listening or reading.

Recommend
We recommend:

Podcast “Na Vlne Kodu”

Na Vlne Kodu (On the Wave of Code) is an IT podcast from msg life Slovakia, which regularly brings you topics from the field of psychology, HR and news from the IT world. Listen to other episodes of the Na Vlne Kodu podcast.

Jakub, please introduce yourself and the philosophy of your generation. What are other generation names?

I’m Jakub Novak, I’m 21 years old and I’ve been working at msg for less than two years as a system administrator. I signed my contract with msg life on the day that was also my last day in high school. And like you said, I’m part of generation Z, which is just entering the job market and changing the work environment. Generations are divided by age, or by the year you were born. The basic ones are Generation X, Generation Y and Generation Z – that’s my generation. And the generation that follows my generation is the Generation Alpha, which is expected to last until 2025, if I remember correctly. I’m not the youngest anymore…

Recommend
We recommend:

Read also: Generations Z, Y, X and baby boomers

Zoomers are said to have their own vocabulary, that is, special expressions that we may not always understand. Can you give an example?

I have to admit that I don’t know all of these terms. Yes, we have our own vocabulary, but not every Zoomer always understand it. But if I were to test you, I’d start with the word salty. Do you know what it means?

Like in salted caramel? Not even close, I guess…

No. It means that someone was grumpy or insolent. For example, if I say that a colleague was salty at a meeting, it means that he was being resentful. Or try to guess the term flexing.

Honestly, I have no idea what that could mean.

To flex on someone is to show off. When somebody is flexing, they’re showing off with something: “He’s flexing again with his Japanese.”

OMG, I would never guess that! Anyway, how much time do you spend on Instagram?

I’m trying to limit it. There was a time when I spent a lot of time on Instagram. Nowadays, I have my timer set to 1.5 hours a day. I try not to use up that timer because even that is an insane amount of time spent on social media in my opinion.

Generation Z grew up with a completely different approach to technology, social media and education. As a representative of this generation, what actually sets you apart from us older, maybe more experienced ones?

It’s the technology that sets us apart. We basically grew up with it, because it is in the last 10 to 20 years that the biggest development in technology has taken place. When I was born, some of today’s technologies didn’t exist. I saw some of the technologies being born and evolving and I was one of the early users. Since Zoomers literally grew up with technology, they probably know it a little better than you, who had to learn to work with it and adapt to it.

‘We didn’t have to adapt to technology — we grew up with it.’

Many of us use different emoticons, you Zoomers the most. Which emoticon is the most typical for you?

This may sound a bit critical, but if I had to put our generation into one emoji, I’d use facepalm – that’s the emoji with a hand covering the face or eyes.

Is it true that your generation can’t survive without Wi-Fi for more than 10 minutes? Is that true for you too?

I guess it depends on the situation. If I have a work emergency or an open ticket that I need to resolve urgently and my internet goes down, that’s a problem for me. But outside of work hours, it is not. A lot of times I’m very happy when I don’t have a signal and can’t connect to the virtual world. When I know that I cannot access social media, the internet. I am glad to have this moment of peace when I don’t have to check my phone because I know that no notification will come.

Zoomers are also called the digital natives generation. Have you heard of it?

As you put it, no. But I hear quite a lot about the fact that we are a digital generation. And that we’re a rotten generation precisely because we’re a digital generation. But we grew up on technology that was developed by people who were already alive. So yes, we are a digital generation, but it is not our fault.

‘We are the digital generation. But we grew up using the technology that your generation developed.’

What about books? Do you prefer ebooks or printed books? What was the last book you read?

I personally don’t like the electronic form of books. I don’t like e-readers and reading on the tablet or computer. I really spend a lot of time behind a monitor and it’s taxing on my eyes. When I want to read something, I want to feel the paper in my hands. There are a few books I am reading now, they are non-fiction. Yesterday, I read a book called Learn to read people like a book. It’s about understanding emotions and personality types.

Generation Z is said to be very mindful of mental health. Is this something important to you or is it just a trend on social media?

In my opinion, it’s not a trend. It is a problem of our generation – at least from what I perceive around me and what has happened to people around me. It’s been in the news a lot that various forms of depression and anxiety disorders are on the rise. I think one of the reasons is technology. I’ve read about studies that have looked at the link between technology and anxiety or depression. Almost everybody shows off on social media. And people often compare with what they see there. But it doesn’t always reflect reality it’s rarely what it looks like. However, if I don’t take this into account and spend too much time comparing myself to what I see, it can cause a mental imbalance.

What does the working world look like through the eyes of your generation? Is work more than just a job for you? Are you looking for meaning, balance, self-fulfillment?

For me personally, it is very important that the work is meaningful. I see a lot of people around me, not only from my generation, who go to work, do 8 hours and go home. When people don’t like their work, efficiency goes down and the results are not as good as when it is done by someone who is passionate about it. Personally, I’m always looking for some meaning in what I do. Even in my position, because I work with quite complex systems, I see meaning in being able to create some value – some order or structure in information, the data, the management. And that’s what gives me that meaning and drives me forward. Not that I come in, stay there as long as I have to, get some money, go home at 4 p.m. and don’t want to hear about work anymore.

“I always need to find meaning in what I do.”

Your generation is trying to maintain some work-life balance. How would you define your ideal working day? . Ako by si definoval svoj ideálny pracovný deň?

I have a problem with balance sometimes, because I really love my job. Sure, not everything is interesting, that’s not in any job, but most of the work is really fulfilling for me. Sometimes I have to force myself to stop working. Sometimes I start doing something and suddenly it’s two in the morning. I try not to do that, but still, it happened to me sometimes. But if I have to define my ideal working time or working day, it’s definitely not just sitting at the computer. When I come into the office, I’m happy to see a colleague if there’s someone that day, because a lot of colleagues work remote or have a hybrid model. So I don’t always see the same colleagues, but at least I see a face that I can talk to! Part of the day I just work alone in the office, trying to be as productive as possible with my phone set in work mode so I’m not distracted by notifications and trying to give my best performance. But then we go for coffee, for lunch, for another coffee and then I work as hard as I can again. So it’s not just about sitting at the computer, it’s also about getting some rest, going to the office, meeting people and talking.

Recommend
We recommend:

We covered the topic of work-life balance in Podcast #1: Work-life balance and healthy work-life boundaries.

They say your generation grew up on motivational quotes on Instagram. Is it true?

Yes, I think our generation grows up sometimes on overly motivational quotes. It’s fine to a certain extent, yes, it does motivate you when you read something that fits your situation, but there’s no need to overdo it.

How does your generation perceive traditional work benefits such as meal vouchers or company parties? Are these just an anachronism for you or do you appreciate them?

I really like corporate events. Since I sit behind a monitor almost all day, I like to get away from it. And just like when someone works with people, they prefer to relax and have peace and quiet, for me it’s the exact opposite. I sit in silence all day and concentrate and then I need to go among people. When we get opportunity to participate in corporate events outside of working hours, whether it’s painting, different workshops, fitness classes, group workouts and so on – I am in. It’s very important to me because I get to see people again and I can connect with them. I very much appreciate that the company organizes such events.

You mentioned that you also work from home. What is your ideal dress code? Do you work in pyjamas?

I don’t work from home much, my job requires me to be in the office (learn more about tips for home office efficiency). However, wherever am I, office or home, it’s never pyjamas. I feel very comfortable in a shirt or smart-sporty clothes. At home, however, there’s no point in wearing a shirt because no one can see me. Most meetings are held without cameras. And I don’t work in sweatpants either, I usually wear some jeans and a t-shirt.

In your opinion, what are the strategies to set up cooperation between different generations? How can we cooperate with each other?

Generational differences can sometimes be complicated because the perception of reality and the world is completely different. I see this with my parents, for example. When I send them a reply to a message in emoticons expressing something, they don’t always understand what I meant. But there are different techniques to improve this. Whether it’s adjusted communication, for example in-person meetings versus online platforms. Older generations are used to face-to-face meetings. My generation experienced Covid, so for a couple of years I functioned only online, without meeing literally anybody. It was hard for me because I really like the face-to-face contact with people. Through a screen it’s impersonal, you can’t read emotions. Personal contact is different. And in terms of other strategies, it’s creating opportunities for team work, where we can communicate with each other so that we’re not each doing separate things. In our team, for example, there’s quite a big generation gap between some of my colleagues. But I personally see support from them. I’m never afraid to come to them saying I don’t know something. They don’t make fun of me and they always help me solve the problem. They don’t patronize me, they always try to guide me on how to do it or where to find the information. Because after all, nobody knows everything. I admit to myself that I don’t know everything. Which is why sometimes I have to come and ask for help, because I don’t want to mess anything up. And I know that my colleagues are experienced and have done it before. I don’t feel any condescension on their part or that they’re trying to put me down just because I’m younger. So we have teamwork set up very well and it’s very nice to work with people across generations. After all, we are in the IT business. The people who developed those technologies are still working in IT, and people like me, who were born when they were developed, are still working with them.

‘I feel supported by my senior colleagues in our team. They always help me solve problems.”

Do you use flexible working hours? What other company benefits do you like?

Flexible working hours is one of the huge benefits that msg life provides. We have fixed hours when we have to be available, it’s from 9:00 to 3:30 p.m.. The rest of the time I can schedule as I need. If I need to move somewhere, that remaining time is off-peak and the transfer to or from work is seamless. If I need to run an errand in the morning, I know that I can just go to that particular place at 8 a.m. because I can get it done and be in the office by 9 a.m.

What is your top benefit?

If I had to pick one – after all, we have dozens of them – for me the top benefit I like and use the most is massage. Because of the fact that I sit or stand most of the day, since we got electronic desks – for me this is one of the top benefits a company can provide. Plus workout. It really helps a lot.

Did you know that…

…at msg life Slovakia we value our employees and respect differences? We offer flexible working hours and the possibility to work remotely. In addition, we have unique benefits for our colleagues, from which everyone can choose their own. Check out all of our 70 employee benefits and join our team. msg life Slovakia is looking forward to meeting you!

Jakub, social media and technology are a natural part of life for your generation. What are their drawbacks?

I think that instead of bringing us closer together, social networks are separating us more and more. It’s too easy to connect with someone. If I can text a person in 5 seconds, why would I spend dozens of minutes moving to see them in person? For me, however, that personal contact is much more important. If I have to choose between going for coffee or texting, I choose coffee. I read the book Digital Dementia by German neuroscientist and psychiatrist Manfred Spitzer, who explains what happens to our brains if we spend too much time not only on social media, but with technology in general. How it affects our brains, creates addiction. I definitely recommend this book to our listeners. In my opinion, it’s definitely not beneficial to spend too much time on social media.

‘Rather than bringing us closer together, social networks are increasingly dividing us. Spending too much time on social networks is not beneficial.’

What about the mobile phone? How do you handle situations when your mobile phone has no signal?

I’d probably say the same thing as with the Wi-fi – it depends on the situation. If I have people with me, that is, if I’m in company and not currently dealing with work or some other obligation, I don’t necessarily need my phone. I don’t need the signal because I’m with people. But if there is a work emergency or some case that I need to solve, it is important that I have the signal.

How much time spent on social media is too much for you?

I personally think any time spent on social media is too much for me. It’s a waste of time. I could use that hour and a half I mentioned for completely different things. But it’s not an hour and a half straight. It’s those few-minute stretches where I open Instagram, look at something, close it again. But when you accumulate that over the course of a day, it’s an hour and a half. It’s too much time.

The world without technology is sometimes better. Just going out in nature, spending time with your colleagues, going for coffee, having lunch together… That’s the best.

Yes, I was looking forward to coming here for a month because I knew how beautiful the road between Ruzomberok and Rojkov would be. With all these colours! And that’s a great experience for me – that I’m passing through this magical autumn landscape, coming here, talking to you. It’s completely different than when I’m sitting at home locked behind my computer. The personal contact is different.

Your generation is also known for having a very different approach to relationships and social issues. How do you perceive this? Is it more about digital friendships or do Zoomers like meeting face to face?

We experienced Covid, when we had to be isolated from other people, most relationships at that time were online. I think this whole situation has changed the way our generation approaches social issues, because we’ve gotten used to dealing with things online. It’s easier to hide behind an anonymous profile or say something online even non-anonymously than it is to say it in real life to your face because online I’m not standing in front of you and I can’t see you. And that, to me, is not good. People are not afraid of saying things, there’s less mutual respect and people want to argue, they don’t want to deal with social issues or communication. So if I had to answer that question about what the Generation Z approach to relationships is, I think it’s very individual. I personally prefer personal contact, but I know people who wouldn’t leave the house all day if they didn’t have to. They’ll have groceries brought home and just sit at home because it suits them that way. I am not here to judge them, but it’s not for me.

When was the last time you searched for something on Google without an incognito window turned on?

You know what, I don’t know the last time I had an incognito window on. I need to get back to most of the information I search for, and I almost never search for anything that someone shouldn’t see. So I don’t really use it.

Do you think it’s still important to learn things by heart or is Google all-powerful and you can find everything on it right away?

You can find everything on it, and maybe even right away if you can define what you’re looking for. But to define what you’re looking for, you need to have some knowledge. Earlier we were talking about chatGPT and not knowing how to generate something. I still say it can’t read minds. ChatGPT can do what you want, but it can’t read your mind. And I see that people sometimes have trouble expressing what they want to say. If you can define what you want to find, in the vast majority of cases you can find it immediately.

Do you think that your generation is interested in ecology? Why is it so?

We all see the state of our planet. We are taking over from some other generation that left it in this state. It’s not just a trend to make something look good. Okay, I came here by car. That car has pretty high gas consumption, so I can’t pretend it was eco-friendly. But since I live in the town and mostly need to drive short distances, I’m considering getting an electric car. Ecology is important to us, after all we all breathe the same air. I am concerned that the carbon footprint I leave behind is as small as possible. Also, I don’t like litter on the streets, so I try not to drop any.

Do you also use bicycle to get to work?

I used to ride an electric scooter… Yes, it’s a battery again, you have to charge it. It’s not a foot-powered thing. But for example, when we had a fitness challenge at work in May, I walked everywhere. I did about half a million steps then. That was a month when I almost never started the car. That’s when I found out how much time I have, because if I plan things out, I can plan my whole day to fit everything in. It doesn’t always work, of course – sometimes it’s raining, sometimes it’s windy, sometimes it’s cold, sometimes it’s too hot, but it’s definitely the most environmentally friendly way to get around. But back to the question. I think that it is precisely because we live on this planet and want to live well on it that we should look after it.

Jakub, do you have any recommendations for other generations to be able to communicate effectively with each other?

If I were to summarize, I wouldn’t go completely for recommendations on how to communicate, but I would highlight that it’s important not to judge by age. Yes, I am young, inexperienced, but I want to learn. And that willingness to learn is directly proportional to what I see from the other side. So if I see a condescending attitude, my willingness to learn goes down because I know that person is not taking me seriously. On the other hand, if I see that I get full support in the team, whether from the boss or from my colleagues, I want to learn because I want to prove to myself and to others that I know what I’m doing and that I want to keep improving. And when I said Zoomers want to learn, we also want to work. Of course, I not saying all of us. That’s not the case in any generation. Maybe in our generation there’s a little bit higher ratio of those who don’t want to work. But I personally want to work, but my motivation is different from other generations. Because of the technology and everything else we’ve talked about in the last 30 minutes, my motivation to do something is completely different than some 30-something, 40-something, 50-something year old person. The older generations might have to adapt a little bit in that, but of course, we also have to adapt to you who have been here a little bit longer. Our generation should be more open to advice from the elders and listen to what they say. Young people sometimes think they know everything. I used to think that too, to a certain extent. And when such thoughts come up, I try to ignore them. Even if we don’t want to take someone’s advice, we should at least listen to it.

‘It’s important that we don’t judge each other based on our age, and that we can adapt to each other. We want to learn, and we want to work.’

Yes, exactly. I think the most important thing is that all generations learn from each other. Dear listeners, thank you for being with us in today’s episode of the Na Vlne Kodu podcast, brought to you by msg life Slovakia. My guest in the studio today was Jakub Novak. I hope you had fun and learned something new. Don’t forget to follow us and keep listening! I am Ivana Hricova and until the next time, goodbye.