jump to navigation

Protecting from worms and other malicious code November 14, 2013

Posted by bkrugman in Security.

As with most security issues I think that end user training is one of the best ways to safeguard and help build a level of protection for a company’s infrastructure.  This however is not a complete fix, but it can help to add some protection.  I am going to go over four ways that I think company’s can help to add some additional safeguards to protect them from not only code like a worm, but also to protect them from a variety of different malicious code.

The first way that I think a company can help to safeguard themselves is to enforce strong password procedures.  Requiring things like special characters, numeric values and a capital alpha-numeric value can help to make the passwords more complex and time-consuming to crack.  This will not prevent a password from being compromised, but it will make it require more effort to crack it.  Having companies require these types of passwords does make things a little more difficult for end users, because they need to remember more complex passwords.  In this case the benefits far exceed the costs.

The next two methods that I think can help safeguard an environment they work hand in hand.  They are to provide the minimum level of access possible to a user on their machine and also to network resources.  A normal end user should not need or have system admin access on their machine.  By preventing the ability for an end user to execute registry changes and other system administration functions a company can help to add another level of safety to a computer and network.  Setting up users with the minimal security access on network files also makes sense, because that way you can ensure that if a file is being modified it is by someone who has access.  By doing this a company is also setting up additional security against malicious code like crypto locker.  If a user only has access to a few files it is easier to restore a few files rather than having to restore an entire file system.

Finally as a way to make maintaining user security easier for the Information Technology (IT) department.  Within a corporate structure there should be security groups setup to grant access to network files and even desktops.  By managing all of the user profiles within security groups it allows for the IT department to provide tighter security protocol and hopefully secure internal corporate resources.

Overall, there is really no way to ensure that you are 100% secure from malicious code and attack.  However, by implementing some very simple security protocols a company is able to make things more difficult for malicious code like worms or viruses to compromise their systems and cause a lot of problems and potential loss of money.



No comments yet — be the first.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: