SystemsNet Blog

Tag Archives: webroot antivirus

5 Ways to Prevent Malware From Sneaking Onto Your Business Network

Prevent Malware - computer security concept

Malware is ever changing and always finding new ways into your device

The single biggest challenge of business cybersecurity is the fact that malware is built to be sneaky. It would be one thing if a hacker attack always triggered alarms and your IT team could fight them off like a castle siege. Or if you could always know what kind of malware would attack and prepare to defend against it. But that’s not how hackers and their automated malicious software work.

Instead, it is their goal to find gaps in your security, slip onto the system, and lurk until there is a way to do damage or otherwise exploit your company. Whether it is spyware, spamware, or ransomware, these malicious programs find ways to sneak into your business network in a wide variety of underhanded and unseen ways. Many businesses today are currently infected and have no idea that their data is being gathered, their IP address is being used for spam, or there is a ransomware attack waiting to strike.

We’ve put together five simple ways that your company can use to prevent malware from sneaking onto your business network in the first place. While hackers are always looking for a new angle, a comprehensive defense can significantly reduce your chances of getting a dangerous malware infection.

1) Fine-Tune Your Firewall

The first step is to make sure that your existing cybersecurity measures are not only strong, but detailed. A firewall is only as effective as it’s settings, and most default firewall settings are not sufficient to block cleverly designed malware. Open ports and generalized policies leave security gaps that malware, disguised as normal business network activity, can slip through.

Masking malware invasions is the primary way that hackers sneak through a firewall. The programs look and act like something firewall default settings will allow and then download themselves right onto your network. Work with your IT team and managed service provider to fine-tune your firewall so that only very specific work activity with key identifiers can make it through.

2) Employee Cybersecurity Training

Human error is actually the leading cause of business malware infections because employees must interact with outside sources like websites, downloads, and client communications in order to do their jobs. This is why hackers have long-since targeted employees with tactics like infected websites and phishing emails.

Your team can be trained to recognize dangerous websites, suspicious “client” interactions, potentially infected downloads, and phishing email attempts so that these are no longer an avenue for business malware infection.

3) Regular Virus Detection Scanning

It’s also safe to assume that at some point, malware will find it’s way onto your network. In fact, there might be some lurking right now from a time before you increased your cybersecurity procedures. This is why virus scanning is so important for both individual workstations and the network as a whole.

There are a variety of virus scanning solutions. There are programs that scan email attachments, computer hard drives, database servers, and complex networks. Make sure to perform comprehensive scans regularly to ensure that particularly sneaky malware does not stay for long.

4) Audit Employee Mobile Devices

Another dangerous avenue for malware infection are employee phones, tablets, and laptops. The more personal a device, the more likely it is that an employee has used it without a business-level of cybersecurity caution while at home or on vacation. The problem is that when these devices come into the workplace and connect to your office wifi, they might be bringing malware riders along with them.

It’s best to make a company policy that requires monthly virus scans of employee mobile devices, particularly if these devices are provided by the company. If employees are uncomfortable with having their personal devices checked for malware, ask them to refrain from connecting to the central company network with unsecured devices.

5) Work-Only USB Drives

Finally, watch out for USB drives. These incredibly useful little devices are great for transferring data from one computer and location to the next, but they can also be carrying infectious malware programs without the knowledge of the user. Once again, this is an especially serious risk when employees are using USBs they have brought from home.

If your workplace uses or permits the use of USB drives for file storage and transfer, make sure the drives are scanned and fully wiped regularly and consider limiting employees to only using work-provided USBs (that you can regularly secure) for plugging into work computers.

Malware is designed to be slippery, to hide on infected devices and to spread to new devices and networks when possible. Protect your business network from sneaky malware infection by covering all your bases, scanning for viruses regularly, and limiting employee’s ability to accidentally bring viruses to work from less careful personal online activities.

For more expert cybersecurity advice, a consultation on the health of your network, or a new MSP partnership for your business, contact us today!

What Can You Do To Defend Yourself Against Ransomware?

What are we learning from Microsoft’s recent emergency security patches?

20170629

Are you running an outdated operating system?

This past May, the ransomware known as ‘WannaCry’ swept through 150 countries and affected hundreds of thousands of computers in organizations ranging from telecommunication companies to nationwide healthcare systems. Devices running older versions of Microsoft software (such as a Windows 7 operating system without key security updates) showed critical vulnerabilities to this powerful, rapidly propagating malware.

In response to WannaCry and to future threats of a similar nature or scope, Microsoft has recently taken steps to supply emergency security patches for various older software, including Windows XP, Server 2003, and Vista. Even when an older system does show some resilience to a WannaCry attack, it can still remain extremely vulnerable to other forms of malware.

The issue of updates and upgrades

Microsoft typically doesn’t support these older systems, and its recent release of free security patches is a deviation from how the company ordinarily operates. It’s an extraordinary measure for an emergency situation. However, where will Microsoft draw the line? What will happen during future occasions involving widespread malware or other security risks?

Some organizations that are reluctant to upgrade to Windows 10, for example, might take this is a sign that they can continue relying on Microsoft to support outdated versions of various Windows software when there’s an emergency. However, this is a flawed way of thinking.

  • Organizations can’t reliably depend on the fact that Microsoft will step in to fix old, unsupported software whenever there’s a major security problem. The company offers no such guarantee.
  • Upgrading to a supported platform like Windows 10 ensures that your organization benefits from the most recent updates.
  • Beyond updates or patches for specific security risks, an up-to-date platform like Windows 10 has also been designed with greater security built into it throughout. If you’re running an outdated system, there may be deep security flaws that can’t be comprehensively addressed just by performing certain updates. Older systems may be lacking in powerful security features that newer systems have adopted.

Managing your systems

Another key lesson we can take from the problem of rampant malware is how important it is to stay on top of managing your IT systems.

You need to make a full accounting of all the devices your business uses, and the information you must stay on top of includes the following:

  • The versions of operating systems and other software your computing devices use. (Maybe you’re using similar software across devices, or perhaps the software you use varies quite a bit from one device to another.)
  • The schedule of upgrades and updates you’ve developed for your systems. For example, have you made updates automatic, or are they manual? How often do you check for new updates?
  • The current vulnerabilities in your system, and your priorities for which to address first. Some security flaws are much more likely to be immediately exploited and cause potentially widespread damage, while others pose less of a threat, at least in the short-term.
  • What each device is connected to. For example, a major security risk comes from devices (ranging from laptops to digital security cameras) that are inadvertently exposed to the Internet and left unprotected. Configuring devices properly and limiting their exposure is critical for improved security.

To further discuss these issues and to receive assistance in strengthening the security of your devices and systems, please contact us. If you don’t manage your software and remain aware of the potential risks, you leave your business far more vulnerable to the threat of malware and other security breaches. The results can prove deeply damaging and include steep financial losses, damaged trust, and prolonged downtime. With our assistance, you can perform any upgrades or updates you need in a timely way and implement cyber security strategies that better safeguard you against the numerous threats out there.

No end to ransomware in sight – so how can Webroot Antivirus help?

20170216

Protection against a ransomware attack

Malware seems to be everywhere, spreading to your devices from a range of sources including infected websites and email attachments.

One type that’s been frequently making the news is ransomware. Once ransomware gets in your system, it will lock you out of critical files or prevent you from using devices on your network. Cyber criminals deploying ransomware give you an ultimatum: pay a certain amount of money by a deadline, or lose access to your data permanently.

ZDNet recently reported on how ransomware has come to dominate malware infections, and has become more malicious and sophisticated, with some strains locking users out of their entire operating system or stealing data off the infected devices.

What are some of the effects of ransomware?

Ransomware can hit businesses and other organizations with staggering costs:

  • If you haven’t made regular, reliable data backups that have been kept safely apart from any system infected with ransomware, you may permanently lose your data. Ransomware can deny you access to financial spreadsheets, invoices, contracts, employee records, customer data, and ongoing projects.
  • Applications you need to use for your business operations are no longer accessible, hindering your ability to meet customers’ needs.
  • You suffer from downtime, with various business operations grinding to a halt.
  • Customers lose trust in your ability to safeguard your systems and their own data.

If you decide to pay the ransom (an inadvisable course of action), you wind up losing more money to the cyber criminals targeting you. Furthermore, they won’t necessarily hold up their end of the bargain; maybe you’ll end up permanently blocked from your data. It’s also possible that the criminals will accept your payment, restore access, and strike again the next day.

The news is full of painful reports about ransomware. Just recently, a police department lost several years of data (including some evidence) to ransomware, and a hotel paid cyber criminals who used ransomware to control the rooms’ electronic door locks. Hospitals, schools, and of course businesses of every size have come under attack from his virulent form of malware.

What can you do to prevent a successful ransomware attack?

Maintaining well-protected data backups and training employees in safer computing habits are both essential strategies for decreasing the chances that you’ll suffer a ransomware infection.

There’s also another line of defense that can help you protect your devices: a powerful, comprehensive anti-malware program.

For example, let’s look at the highly recommended Webroot anti-virus.

The core quality of any anti-malware program is its ability to identify malware and block it from becoming active on your devices. To detect malware, Webroot works off a massive database in the cloud. The database undergoes real-time updates, keeping you protected against the latest known threats.

What if you’re facing a new strain of malware that hasn’t yet been identified? This is a legitimate concern for ransomware in particular, with cyber criminals generating and deploying new strains. In that situation, what Webroot would do is analyze the new code introduced to your computing device and maintain it in a kind of quarantine until it’s deemed acceptable.

Will this work to fend off ransomware 100% of the time? Unfortunately not. There isn’t any anti-malware program that can successfully block every single strain of ransomware, especially new ones that crop up. Webroot, at least, offers you powerful, intelligent monitoring that will still detect many of the threats menacing your business.

The prevalence and maliciousness of ransomware makes it one of the greatest threats to your business. Although anti-malware/anti-virus software can’t serve as your sole defense against ransomware, when it’s an effective program like the one offered by Webroot, you still enjoy significantly heightened protection. Don’t hesitate to contact us for more information, including advice about the Webroot package that’s best suited for your business.