Trojans – and how to protect your network against them