A Guide to Spotting and Preventing Malware Infection

Defending networks from attack is no easy task for IT professionals. Attacks range in capability and threat; and overreacting or implementing the wrong technology can be costly
and make it easier for the bad guys.  This eBook describes the types of attacks facing a typical network and offers some successful mitigation strategies IT professionals have implemented to protect their networks.

Ultimately, treat this guide as a first step in designing your defense-in-depth strategy. IT professionals must truly understand the risk to the business and that IT security does not have ”magic” solutions. There isn’t a single technology that can prevent all the bad scenarios, despite what vendors say.  Cyber attacks, malware, and system vulnerabilities have been mystified and media-hyped beyond any sort of reasonable analysis. In fact, the most effective IT strategies against all unknown and known threats are generally the same.  Patch and update the operating system, patch and update third party applications, restrict administrative access, and use malware defenses. These recommendations come from years of analysis by government and security organizations around
the world.

Lastly, offense informs defense. This means IT service providers need to learn how to view their customers’ networks as targets. I’m certainly not advocating unleashing your own destructive cyber attacks on unwitting customers, but setting up a virtual cyberdefense lab and downloading free tools to explore vulnerabilities will help you get better at defending and detecting attacks on your own networks.

Remember, as an IT professional you are partially or completely responsible for the confidentiality, integrity, and availability of the IT systems in your care. Don’t make it easy for the bad guys; make it frustrating and difficult by putting in detective, preventive, and forensic defensive layers.

Leave a Reply

Your email address will not be published. Required fields are marked *