As technology continues to change, the number of ways your company can be targeted in a malware attack grows. At Five Nines, we emphasize educating our clients about potential attacks and what they could do to their operational systems. As their dedicated IT provider, we also prepare their network to fight these attacks and keep systems secure. While we do install anti-virus software for our clients, it’s only one tool in our belt, given that additional layers of security are needed now that hackers are more sophisticated. Before we get into why you can’t solely depend on anti-virus to stay secure, let’s define terms that are crucial to understand when we’re talking about anti-virus software and security.
Malware is a broad term that defines any malicious code or program that gives an attacker explicit control over your system. It may refer to all types of malicious programs including viruses, bugs, bots, spyware, ransomware, etc.
Anti-virus, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. It’s the most commonly used weapon against malware.
Layered Security, also known as layered defense, describes the practice of combining multiple security controls to protect assets, such as resources and data.
Now that we have some context, let’s talk about why anti-viruses can’t keep up with the increasing number of malware attacks. While there have been thousands of cyber-attacks, one that really called attention to this growing issue of anti-virus protection happened in 2013. Over the course of three months, attackers installed 45 pieces of custom malware and stole crucial information from The New York Times. The Times — which uses anti-virus products made by Symantec — “found only one instance in which Symantec identified an attacker’s software as malicious and quarantined it.” The IT services team just didn’t catch it.
To get rid of the hackers, The Times “blocked the compromised outside computers, removed every back door into its network, changed every employee password and wrapped additional security around its systems.” Ultimately, this is just one example of how hackers can create software that surpasses anti-virus software. They’re now able to design a piece of malware, run it on a computer with that anti-virus product to see if it will be detected, and if it is, then they can modify the code until the anti-virus software no longer detects it. What this means is that unless a traditional anti-virus software has seen a particular threat in the past, it won’t necessarily protect your computer. There are new products that are able to ward off some of these new threats. For example, Cylance Inc. develops anti-virus programs with Artificial Intelligence to prevent, rather than reactively detect, viruses and malware – this is also referred to as “Next Generation Protection”.
How to Stay Protected
- Keep Your Systems and Software Up-To-Date
- Firewall Installation
- Encrypting Information
- Password Management
- Image-Based Backups
You can implement a firewall in either hardware or software form, or a combination of both. Your IT Managed Services Provider can help you set this up and monitor it for success on an ongoing basis. There are next-generation firewalls, as well. Unified Threat Management (UTM) provides multiple security features and services in a single device or service on the network. UTM includes a variety of network protections, including intrusion detection/prevention (IDS/IPS), gateway antivirus (AV), gateway anti-spam, VPN, content filtering, and data loss prevention.
If a hacker can infiltrate your system and steal your information, encrypting the data will make the information useless to them. Encryption is the most effective way to achieve data security because it turns your crucial information into code. To read an encrypted file, someone would need access to a secret key or password that enables them to decrypt it/ BitLocker, Microsoft’s easy-to-use, proprietary encryption program for Windows, can encrypt your entire drive, as well as protect against unauthorized changes to your system.
Changing passwords often and ensuring that they are difficult to guess are two ways to keep yourself protected. Other tips include: choosing a password that’s not obvious, using a password manager to keep track of all your passwords in one place, and being aware of data breaches.
It’s important to be in a position to recover your environment with backups if you do encounter a breach. At Five Nines, we use image-based backups to keep your business running. Image-based backups are just what the name states: an image of your entire operating system, rather than individual files on your PC.