In this post, I will cover two ways to protect your enterprise from portable apps and commodity malware using free technologies. These simple efforts can significantly improve the security of your enterprise, reduce support costs that stem from malware infection, and improve user experience.
Month: January 2015
Understanding Antivirus – Signatures, Scans, and Schedules
Antivirus, when used properly, can provide great protection for an organization if used effectively. Although antivirus may appear to be a set-it-and-forget-it software, diligence in managing antivirus can pay off. Understanding Signatures As you probably know, antivirus software works off of signatures of known malicious files. These signatures are distributed periodically to all antivirus clients, … Continue reading Understanding Antivirus – Signatures, Scans, and Schedules
Am I Pwned? – 5 simple ways to help determine if you should be concerned about malware you discover on your network
One of the difficulties involved with malware analysis is determining exactly how concerned you should be when you find a new sample on your network. Categorizing malware does not require high cost tools and access to subscription-only databases (although these can help). The following is a list of ways to help determine how concerned you should … Continue reading Am I Pwned? – 5 simple ways to help determine if you should be concerned about malware you discover on your network
Beginning my first book
I am back to work again after taking some time to relax this holiday season. I look forward to resuming analysis of recent cyber trends and sharing my opinion and analysis with my readers this year. In addition, I have just started on my first book, which I hope to complete by June of this … Continue reading Beginning my first book