The war against malware continues... and will continue. As
better methods to block attacks, detect malicious activity and thwart
infections are developed, so will malware evolve. Cybercriminals target
endpoints as it offers plenty of avenues for infiltration. Endpoints are
considered to be the weakest point in terms of security in an enterprise IT
system. Enterprises must ensure robust endpoint protection, and the best way
would be through cloud security.สล็อตPG
There are different types of malware such as - viruses,
worms, Trojans, spyware, rootkits, backdoors, key loggers, ransomware, and
Browser Hijackers. Each type of malware serves a different purpose, and some
malware is a combination of multiple types. Ransomware could be a
combination of a worm, a Trojan, and a backdoor. Further, cyber criminals
identify vulnerabilities in operating systems, applications and exploit them
for attacks. Phishing and spear-phishing are other modes of attacks that
trick users into opening malicious attachments or click on malicious links.
Typical antivirus security solutions are installed on
the local server and endpoints. The malware definition database is stored
locally and this list is periodically updated. The developers of the antivirus
solution keep updating their malware database, and this data gets updated
automatically or manually. There is, however, a certain time delay between the
time that the AV company updates its database and the time the local database
gets updated. This period is very critical, as zero-day malware can attack and
infect the systems.
In order to overcome this vulnerability, and with the advent
of faster internet, cloud-based security has been adopted. Small, medium and
large enterprises must adopt cloud security for a better and faster response to
zero-day attacks.
As a basic practice, enterprises must:
·
Set
up endpoint security effectively to thwart attacks
·
Regularly
update the virus databases – this would be more effective with an adaptation of
cloud security
·
Schedule
frequent scans to detect any malware infiltration
Compelling
Reasons to Adopt Cloud Security
Cloud-based security is easier
to manage. Updates, monitoring, etc.., can be done from the cloud.
If you are an MSP then ensuring
proper security of client endpoints can only be done through cloud security and
remote monitoring and management. Update management – operating system,
applications and security products - can be torturous if not done through cloud management.
Endpoint security product developers/ antivirus
product companies usually share their discovery of malware in a global
repository. This combined effort makes information about new malware available
quickly to those who access the database.
0 comments:
Post a Comment