This website uses cookies. View our cookie policy
Close
USA
Select regional store:

Cybersecurity: Malware protection

Protecting against a broad range of malware (including computer viruses, worms, spyware, botnet software, and ransomware) and including options for virus removal will protect your computer, your privacy and your important documents from attack.


Why is malware protection important?

Malicious programs can be delivered physically to a system through a USB drive or other means, or via the Internet through drive-by downloads, which automatically download malicious programs to users’ systems. Malicious websites and phishing – scam emails disguised as legitimate messages that contain malicious links or attachments – are two common delivery methods. More sophisticated malware attacks often feature the use of a command-and-control server that allows attackers to communicate with the infected systems, exfiltrate sensitive data and remotely control the compromised device or server.

An attack can be incredibly damaging, so it is important to protect your system, your privacy and your sensitive documents.


How to protect yourself

To minimise the risk of malware, your organisation should adopt at least one of the following approaches:

Anti-malware software

  • Keep software up to date, with signature files updated at least daily.
  • Configure software to scan files automatically upon access. This includes when files are downloaded and opened, and when they are accessed from a network folder.
  • Ensure software scans web pages automatically when they are accessed through a web browser.
  • Ensure software prevents connections to malicious websites.

Application whitelisting

Only allow approved applications to be executed on devices. Ensure that your organization actively approves such applications before deploying them to devices, and maintain an up-to-date list of approved applications.

Application sandboxing

Ensure that all code of unknown origin is run within a ‘sandbox’ that prevents access to other resources unless the user explicitly grants permission.


View another Cyber Essentials control:


Speak to an expert

For more information about the Cyber Essentials Scheme, get in touch with one of our experts today.