While endpoint security and firewalls are critical in preventing business disruptions, these measures alone are no longer sufficient to ward off the sophisticated avalanche of malware pervading our daily lives.
Threats come in a variety of shapes and sizes with the most frequently used infection channels being: e-mail; the Internet; and individual PCs.
* E-mail is an essential channel of communication. However, it is also the principal channel for spam and phishing along with a host of other types of malware. For this reason, there needs to be protection at both server level and at the level of the individual mail client to ensure the responsibility for threat prevention does not fall entirely on individual users.
* Internet-borne threats are becoming increasingly common with malicious content often being disguised so users are unaware that they are downloading infected files. Typical cases include plug-ins to watch certain videos, pdf documents hiding malware, etc.
While traditional security solutions are critical as a first line of defence, companies of all sizes still face the risk of numerous security holes which can be exploited by modern malware techniques. To prevent malware from silently infiltrating corporate networks it is essential that companies:
* Adopt a sound security strategy to cover the main infection vectors;
* Monitor remote users to ensure they do not connect to the main network with infected devices;
* Manage remote offices carefully;
* Ensure employees are informed of the latest infection techniques; and
* Screen all computers, laptops and external devices routinely.
It is imperative that companies employ leading-edge technology capable of ensuring all the main infection vectors are covered. Panda Security’s GateDefender is a unified threat management gateway (UTM) which filters all traffic entering the network perimeter. Panda Cloud Office Protection Advanced covers all three vectors with endpoint protection, anti-spam and an upcoming Web filtering module, the first of its kind in a cloud based solution. Such solutions are specifically designed to assist in achieving maximum business security.
However, it is no good simply securing the main infection vectors (e-mail, Internet, individual PCs) while leaving other areas within the IT infrastructure exposed. It is equally important that organisations adopt sound company security policies such as tight password control; apply regular security patches for Microsoft windows; ensure that security products remain up to date; and that remote users adhere to security policies and are carefully monitored.
For more information contact Panda Security, 08600 PANDA (72632), [email protected], www.pandasecurity.co.za
© Technews Publishing (Pty) Ltd. | All Rights Reserved.