Corporate spyware prevention

351290 pts.
Tags:
Antispyware
McAfee Antivirus 8.7
Microsoft Windows XP
Virus protection
Windows XP Security
What is the best corporate spyware prevention method? Software or hardware and what would you recommend for a 40-person all Windows XP shop? We have McAfee 8.7.1 with the spyware module but we are still contracting viruses and Trojans on a daily basis. Any suggestions?

Answer Wiki

Thanks. We'll let you know when a new response is added.

Hello, as of ur query, at present no one Anti Virus software provides the best quality service to protect computers, specially the computers runs on Windows OS. There are no of Anti Virus softwares in the market, but no one cure the system absolutely. If u use Mcafee it shows there is no virus after that again u run QucikHeal it shows malware is there! So it is not possible to cure systems completely forever. Though my opinion is to follow the next suggestions to 98-99% cure ur systems:

Spyware Protection and Prevention

Spyware today is more malicious and powerful than ever before. That’s why spyware protection requires the power of knowledge and the support of antispyware experts to keep you safe online. Webroot has the most technologically advanced spyware detection and research system in the world.

1. The best spyware protection begins by avoiding unwanted programs in the first place. One of the primary sources of spyware infection is free programs downloaded from the Internet. There’s really no doubt about it: safe file sharing is next to impossible. There are reputable sites that offer legitimate freeware but it’s difficult to investigate every free program to distinguish between the good and bad. Take these steps to strengthen your spyware protection right away:

* Only download software from sites you trust
* Pay careful attention to what you’re downloading and know what other programs you’ve agreed to along with the original file
* The next time you’re redirected to a site that tempts you to install a search toolbar, screen saver, smiley faces or cute cursors, think twice
* Check reviews by other users before installing a program

2. Increase your browser security settings:Protect yourself from drive-by downloads, automatic installation of unwanted programs by setting your browser security settings to “High.” Update your security patches regularly

3. Another easy form of spyware protection is to make sure your operating system is up-to-date with all the latest security patches.

4.Avoid questionable Web sites. Avoid Web sites that offer unscrupulous content such as pirated software or adult material. These sites are notorious for spreading spyware threats. If you are visiting such sites, do not click “yes” or “OK” to anything or you will likely receive some form of spyware.

5. Be suspicious of email and IM

6. E-mail and instant messaging are common delivery methods for malicious programs. To beef-up your spyware protection you should:

* Avoid opening attachments unless you know the sender and are expecting something
from them
* Immediately delete messages you suspect are spam – Do not open them!
* Avoid get rich quick offers, pornography or too-good-to-be-true messages
* Do not provide personal information to any unsolicited requests for information
* Avoid clicking on links within a message
* Reviewing an email in the preview pane can initiate a spyware/virus download, so turn
off the preview option

7. Use public or multiple-user computers with extreme caution

Spyware protection is much more complicated when you’re using a shared or public computer, as it is nearly impossible to know what other users may have done there. Detecting spyware is the first step to securing a PC. When using a multiple-user computer, protect yourself by first visiting free spyware scan. See if anything exists on the public PC that could steal your identity or monitor your Internet browsing session.

8. Beware of peer-to-peer file sharing services

9. P2P network clients often load malicious programs onto your PC when you sign up for their service. The files you swap and share (photos, music, videos or games) may contain malicious programs. The most conservative protection plan would be to avoid these services all together. If avoiding these isn’t an option, make sure to have security software installed and up-to-date.
Use a firewall

10. A firewall’s basic task is to control traffic between computer networks with different zones of trust. The Internet, teeming with spyware, is a no-trust zone; an internal network usually is (or should be) a high-trust zone. Use a firewall that monitors traffic between computers on an internal network as well as the Internet traffic in and out of your computer. The firewall should also hide your PC from online scammers looking for easy targets.
Use antivirus protection

It is crucial to have the latest antivirus signatures from an established security software vendor. While free antivirus downloads are available, they just can’t stay ahead of the continuous onslaught of new threat strains. Previously undetected forms of spyware and viruses can often do the most damage, so it’s critical to have up-to-the-minute, guaranteed protection. Use a quality antispyware product, not a free one Online threats are becoming more and more sophisticated and free applications just can’t keep up. Purchasing a quality antispyware product is the best way to protect your PC from spyware. Manual removal of spyware is extremely difficult, even for experts, and isn’t recommended. Look for these qualities when selecting a spyware protection solution. AND SAY NO TO “FREE”.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Best solution would be a multi-tier solution using various “engines” when possible.

1) At the perimeter:
Implement a web access solution (e.g. Barracuda Web Filter, Bluecoat Proxy SG w/ AV)
Implement an e-mail security solution (e.g. Barracuda Spam Firewall)

2) Internal core
Implement an anti-X solution (Kaspersky, Sophos, Mcafee, etc) at the workstations.

3) Remote
Implement remote access solution onto laptops (BlueCoat proxy agents) – this will provide content filtering on laptops when they take them off-site.

Discuss This Question: 2  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Chippy088
    Basically, train your users not to automatically allow a download when the popup asks for permission to download. They need to be more aware of the fact that just because they are on a site it doesn't mean the download is from them, or it is benificial. BHOs are a typical example. Once you are in a website, and the computer has accepted cookies, anything could be accepted as 'secure' whereas it might just be a trojan masquerading as a 'free' scan or registry check. Don't allow them to do it. ANY checks for viruses or registry errors should be done 'in house' and off-line not by some anonymous site. Software/hardware is only a portion of the solution. Without training users are gullible and too trusting. Time taken to make users aware of the dangers is a reduction in time spent catching and cleaning the virus/trojan.
    4,625 pointsBadges:
    report
  • Darkstar911
    NOthing will give you 100% protection. You just have to try to keep up with security updates and educate the end users. Another tool I would recommed is OpenDNS. OpenDns will help you filter out some of the malicious sites and you can customize the sites to be block by catagories. I found it very useful and best of all, it's a free solution.
    790 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following