Stop Malware With This Best Practice List

Symantec offers a checklist of best practices for stopping malware and other threats.

By Enterprise Networking Planet Staff | Posted Mar 24, 2011
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

The RSA 2011 Cybercrime Trends Report suggests that cybercriminals are shifting from using malware to target consumer desktops to targeting employees in the enterprise. This Network World article says that contributing factors include employee mobility, the use of social sites and user-driven IT. Taking the topic to experts, Symantec provides a checklist of best practices for stopping malware and other threats in this security-focused article.


"Block P2P usage. The simplest method for distributing malware is hidden inside files to be shared on peer-to-peer (P2P) networks. Create and enforce a no-P2P policy, including home usage of a company machine. Enforce the policy at the gateway and/or desktop, for example, by blocking the main executable file of an unwanted application.

"Turn off Windows AutoRun (AutoPlay). Stop Conficker, Downadup and other network based worms from jumping from USB keys and network drives without changing company polices on Open Shares. Get specific details on this tip from Symantec and from Microsoft."

Read the Full Story at Network World

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter