10 Steps to Reduce Malware and Penetration Risk

Our organization is seeing a steep increase in system malware attacks, almost all of which are avoidable. To be blunt, the cost of malware to both personal computers and business is almost incalculable.

Although a well designed malware will not cause damage, most are not well designed. The result is lost time, productivity, and money as your systems are rebuilt. Many present no indication of their presence except for "it crashes a lot", or "it's a lot slower lately". But these are the benign symptoms of infection. Malware can harvest all of the data on your computers, your servers, and everything that passes along your network–including usernames and passwords. Cryptolocker-style malware encrypts your hard drive and backups, holding them hostage, until you pay up (in bitcoin, no less).

If you are ready to take back your power over your systems, here are my IT 10 commandments:

  1. Thou shalt have only one person or team supporting the system.
    (Too many chefs spoil the broth.)
  2. Thou shalt log in as a non-administrator.
    Most malware takes on the power/authority of the currently logged in user. If logged in as an administrator, malware has unquestioned control over the entire system. If logged in as a non-administrator, although the users directory may be toyed with, the system and applications are protected.
  3. Thou shalt update system and applications ASAP.
    The #1 reason updates exist is to resolve security holes. The faster the updates are installed, the more secure your system.
  4. Thou shalt application whitelist.
    Anti-Malware software, at best, can only catch known malware. This allows a large window of opportunity for unknown malware to wreck havoc. An application whitelist specifies which applications may be launched. In this way, the launching of unknown malware may be stopped.
  5. Thou shalt store all data on encrypted storage devices.
    Should your device be lost or stolen, encryption prevents unauthorized access to the device. Without encryption, the device may be accessed, allowing easy unauthorized access to your network by both human and malware.
  6. Thou shalt have quality anti-malware active at all times.
  7. Thou shalt use strong passwords.
    A minimum of 14 characters, in an easy to enter, easy to remember phrase.
  8. Thou shalt backup daily to both local and Internet.
    Backups should keep historical archives of deleted and modified files–a lifesaver in the event of infection or corruption.
  9. Thou shalt permit only company equipment on the company network.
    None of the previous steps will protect the systems should a malicious device access the network.
  10. Thou shalt use company equipment only for company business.
    Social media sites, adult sites, entertainment sites, email from friends, all open a wider door to intrusion.

4 Responses

  1. You're on top of the game. Thanks for shirnag.
  2. We definitely need more smart people like you around.
  3. That hits the target perfectly. Thanks!
  4. I have been creating carefully translated captions using overstream.net, but Youtube has now blocked it. Youtube's tools DO NOT allow me to create the same level of high-quality captions that I created for my classes using Overstream, Please continue working on your captioning tools, AND PLEASE STOP blocking overstream.net from adding high-quality captions to Youtube videos.Another option for YouTube would be to buy overstream.net and to make it a part of YouTube.

Leave a comment