Stop Malware With This Best Practice List

Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

The RSA 2011 Cybercrime Trends Report suggests that cybercriminals are shifting from using malware to target consumer desktops to targeting employees in the enterprise. This Network World article says that contributing factors include employee mobility, the use of social sites and user-driven IT. Taking the topic to experts, Symantec provides a checklist of best practices for stopping malware and other threats in this security-focused article.

“Block P2P usage. The simplest method for distributing malware is hidden inside files to be shared on peer-to-peer (P2P) networks. Create and enforce a no-P2P policy, including home usage of a company machine. Enforce the policy at the gateway and/or desktop, for example, by blocking the main executable file of an unwanted application.

“Turn off Windows AutoRun (AutoPlay). Stop Conficker, Downadup and other network based worms from jumping from USB keys and network drives without changing company polices on Open Shares. Get specific details on this tip from Symantec and from Microsoft.”

Read the Full Story at Network World

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends, and analysis.

Latest Articles

Follow Us On Social Media

Explore More