Securing against Viruses, Malware and Hoaxes Good Practice Guideline

Size: px
Start display at page:

Download "Securing against Viruses, Malware and Email Hoaxes Good Practice Guideline"

Transcription

1 Programme NPfIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mark Penny Version Date 12 th February, 2010 Securing against Viruses, Malware and Hoaxes Good Practice Guideline Crown Copyright 2010

2 Amendment History: Version Date Amendment History 0.1 First draft for comment /08/2005 Second draft for Peer Review /10/2005 Comments from Phil Benn incorporated /02/2006 Technical Author, Sections added /03/2009 Reviewed, revised and updated. Previous author: James Wood /03/2009 Further updates following peer review /03/2009 Further updates following peer review /04/2009 Draft for approval 1.4a 30/09/ nd draft for approval following approver comments /10/2010 Document approved. Forecast Changes: Anticipated Change When Annual Review February 2011 Reviewers: This document must be reviewed by the following: Name Signature Title / Responsibility Date Version Infrastructure Security Team James Wood Head of IT Security 1.4a Approvals: This document must be approved by the following: Name Signature Title / Responsibility Date Version James Wood Head of IT Security 2.0 Distribution: NHS Connecting for Health Infrastructure Security Team Website Document Status: This is a controlled document. Whilst this document may be printed, the electronic version maintained in FileCM is the controlled copy. Any printed copies of the document are not controlled. 1.3 Crown Copyright 2010 Page 2 of 29

3 Related Documents: These documents will provide additional information. Ref no Doc Reference Number Title Version 1 NPFIT-SHR-QMS-PRP-0015 Glossary of Terms Consolidated.doc Latest 2 NPFIT-FNT-TO-IG-GPG-0033 Glossary of Security Terms ( nfrasec/gpg) Latest Crown Copyright 2010 Page 3 of 29

4 Contents 1 About this Document Purpose Audience Content Disclaimer Introduction Background Anti-virus Desktop Software Gateway Device Software Server Software File Servers, Standalone Servers and Anti-Virus Exceptions Instant Messaging Services Anti-Virus Policy Malware and Spyware User Education Technical Solutions Active Monitoring Passive Network Monitoring Desktop Security Policies 20 5 Phishing and Scams User Education The 419 Scam Pyramid Schemes, Chain Letters & Fake Notifications Current News Hoax Fake Security software hoax Spear Phishing Technical Solutions A Appendix A - Suggested Attachment Block List Crown Copyright 2010 Page 4 of 29

5 1 About this Document 1.1 Purpose The purpose of this document is to establish vendor and product independent guidelines that will enable organisations to minimise the impact of virus and malware infections. It also provides preventative recommendations that should help reduce an organisation s exposure to viruses and malware. Guidance on ensuring the confidentiality and integrity of sensitive information is detailed in this document including: The appropriate measures to take in the event of a virus attack or the discovery of malware on a system or systems. Dealing with malware and spyware introduced into N3 connected systems without the knowledge of users. The minimum standards for anti-virus protection within N3 connected networks How to deal with malware, spyware, hoaxes, phishing and scams which may vary in content but follow a similar overall structure 1.2 Audience This document assumes a general understanding of the terms virus and malware It also assumes a general understanding of other computing related terms. Further information on information security and related matters is available from the NHS Connecting for Health Infrastructure Security Team website: Crown Copyright 2010 Page 5 of 29

6 1.3 Content This document comprises the following sections/topics: Description and information on anti-virus products for different types of platform Technical solutions for monitoring for malware The need for an anti-virus policy The need for user education on viruses, malware and phishing Descriptions of common phishing attacks and how to spot them An appendix of attachment types which organisations could consider blocking because they could be used to deliver malicious payloads 1.4 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by NHS Connecting for Health. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. Any party relying on or using any information contained in this document and/or relying on or using any system implemented based upon information contained in this document should do so only after performing a risk assessment. It is important to note that a risk assessment is a prerequisite for the design of effective security countermeasures. A correctly completed risk assessment enables an NHS organisation to demonstrate that a methodical process has been undertaken which can adequately describe the rationale behind any decisions made. Risk assessments should include the potential impact to live services of implementing changes. This means that changes implemented following this guidance are done so at the implementers risk. Misuse or inappropriate use of this information can only be the responsibility of the implementer. Crown Copyright 2010 Page 6 of 29

7 2 Introduction This document provides general information on the topics of viruses and malware together with potential solutions for their proactive detection and eradication. It covers the concepts of phishing and pharming and what can be done from the perspective of user education in this regard. The document also details additional defence-in-depth concepts which can assist in protecting information assets from harm from viruses and malware. 2.1 Background Attackers are increasingly utilising viruses and malware in their attempts to compromise systems, gain unauthorised access to information and to take control of computer resources - often redirecting these resources for attacks against other targets. Spyware and malware is often bundled with legitimate software. When users install the legitimate software they can also inadvertently install the bundled spyware affecting the confidentiality and integrity of their systems security.. The nature of this type of software can present long term issues for security because it often remains hidden from the user (or poses as a legitimate application) while continually divulging information from the infected host. The most effective defences against viruses, malware and hoaxes are those that combine various technologies and strategies. These range from in-depth technical solutions to effective user education, preventing the compromise of these technical solutions. Crown Copyright 2010 Page 7 of 29

8 3 Anti-virus Anti-virus software and related applications can be used as a technical defence to stop viruses from infecting systems. Such software is generally host based and runs on the system it is protecting. Anti-virus software can detect many types of malware. These types include computer viruses, worms and trojan horses as well as spyware. A computer virus is a type of malicious software which infects files on a computer system. A virus may look for specific types of file to infect such as Word documents; once an infected document is sent to someone else, the virus then spreads to and infects that persons PC. A resident computer virus can survive system reboots and operates in the background on the system, looking for files to infect. A non-resident computer virus only runs when an infected file is launched. A worm is a type of malicious software which does not require user interaction to run. Worms can spread from system to system utilising automated infection methods and generally exploit un-patched software vulnerabilities in order to spread. A worm does not steal personal information from systems but simply exists to spread and cause system problems in relation to integrity and availability. A trojan horse is malicious software which on the surface has a legitimate usage but unbeknownst to the user contains functionality which can be used to steal sensitive data or perform other unwanted actions. 3.1 Desktop Software It is frequently possible to deploy anti-virus software solutions, offering varying degrees of protection, at many different points on the network. Due to the increasing capabilities of desktop machines and their growing exposure to the Internet, host based anti-virus software should be deployed as a bare minimum. A typical feature set would include: On Access (Memory Resident) scanning. On Demand scanning. Scheduled scanning Heuristic capabilities Crown Copyright 2010 Page 8 of 29

9 Automatic updating of definitions and engine. Integration with and messaging services. Logging of all relevant events. Restriction of amendment of software configuration settings to authorised personnel only. It is worth noting that many vendors of traditional anti-virus software solutions have somewhat diversified in relation to the capabilities of their products in direct response to the different types of threat which have materialized in recent years. Many vendors now market their solutions as security suites offering not only traditional anti-virus detection capabilities but additionally features including: A software firewall, Anti-spyware features, Browser plug-ins for detecting phishing web sites and malicious scripts, Anti-rootkit features, USB device control. Whilst such defence-in-depth features may provide additional protection from a broad spectrum of threats, the increased size of the products with their additional performance related demands may mean that on some older systems, system responsiveness is affected. Memory resident scanning provides protection for users from external threats such as malicious sites on the Internet. To provide additional functionality, some websites may download certain files such as Java Applets or ActiveX objects to the users computer. These objects may contain malicious code which then infects the computer. On access scanning allows the anti-virus product to block this malicious code before it runs. All desktop machines connected to the network or with access to the Internet should have anti-virus software installed. The signed Code of Connection or Information Governance Statement of Compliance (IGSoC) 1 details this requirement. 1 Crown Copyright 2010 Page 9 of 29

10 Appropriate mechanisms should be in place to ensure virus definition updates install as soon as available or, if necessary, after stability testing by authorised personnel. Software settings should include daily updates distributed from a centrally provided mechanism. This ensures critical updates will install as soon as available. Further information can be found in the Patch Management Good Practice Guideline (GPG) document available from the NHS CFH Infrastructure Security Team web site. 2 Such frequency of updates may not be possible with portable devices - these will require an automatic check when they access the network and will update as appropriate. Alternatively, some vendors do provide the facility to update virus definitions and the anti-virus software direct from systems controlled by the vendor when a portable device is on the road. This can be useful for devices which are rarely connected to the organisations network. Remote access solutions may provide additional mechanisms, to ensure that the standards for protection are in place on the portable device, before allowing full access to the network. 3 On demand scans allow the user of the machine to scan single files and folders or groups of files and folders as required. This is useful in situations where files have been obtained from a 3 rd party for example (such as on removable media) and the user wishes to ensure that the files are free from viruses and malware Further information is available in the Remote Access and Remote Management GPG documents available from the NHS CFH IST web site: Crown Copyright 2010 Page 10 of 29

11 Scheduled scans should be performed on a weekly basis and should consist of a complete and vigorous scan of the machine. This maintains a consistent baseline of protection. If possible, schedule this scan to run outside of normal office hours or at a time which will not disrupt normal working. For laptops or other portable devices, the scan needs scheduling as normal but should run as soon as possible following the elapsed time when the scan was supposed to run. Many vendors allow their anti-virus products on demand and scheduled scans to be throttled to only use a specific percentage of processor power. This therefore impacts user working less when such a scan is running and should be considered as an option if available and if scans are likely to run when users are working on their machines. A Heuristic capability refers to the ability of the anti-virus software to detect patterns of behaviour on the machine which may represent virus or malware like activities. This type of capability can be useful for detecting viruses and malware which are very new and for which the vendor does not have a specific signature yet available. This further increases the protection that the software can provide. The downside to this capability is that on occasion, innocent activities can potentially be flagged as malicious activity ( false positive ) which can cause unwanted alerts to be generated. 3.2 Gateway Device Software The term gateway device refers to any device which is used to route, inspect or block network traffic. For example, firewalls, proxy servers, remote access devices, routers, Intrusion Detection Systems (IDS) and so forth. Due to their exposure, gateway devices are particularly vulnerable to attack and, if not correctly protected, can potentially act as the initial infection point of a network. The software installed on gateway devices should have all the features of the software deployed on desktop machines but should also include server specific features such as: Inbound and Outbound traffic monitoring. Large Traffic Volume Protection. Heuristic detection mechanisms to detect as yet unidentified viruses in the wild. Crown Copyright 2010 Page 11 of 29

12 Gateway devices require specialist software, expressly designed for operation in server environments or high load situations. Desktop software may not be capable of handling the increase in traffic and does not employ server specific features. The use of different software (possibly from different vendors) also provides defence-in-depth ; separate solutions are less likely to be as easy to compromise as one solution across all areas. Due to the complex nature of attacks, which may spread through the use of , web or network vulnerabilities, the gateway must be able to automatically protect the network when it recognises malicious activity. This heuristic, or behaviour based defence, allows the software to automatically block suspected traffic through automatic detection of new viruses or outbreaks. An example of such a gateway is the web proxy filter. These devices monitor all inbound and outbound traffic (such as HTTP and FTP protocols) for viruses, malware and virus-like activity. Provision of such a device provides defence-in-depth when allied with desktop anti-virus products Server Software is a business critical tool that affects how organisations run, both internally and externally. The widespread usage of and increasing reliance on leaves it open to exploitation as a means for the transmission of viruses and phishing attacks. In addition to the requirements for server grade anti-virus solutions, systems must include specific features that offer additional protection from this avenue of attack. specific features include: Quarantine of possibly infected files. Mass mailing protection. Secured access to logs and quarantined files for audit purposes. Generic attachment filtering (See Appendix A). content and attachment inspection. Controls to prevent the forwarding of infected s. Crown Copyright 2010 Page 12 of 29

13 Multiple virus/malware detection engines If available, it may be prudent to disallow all attachments - apart from those specified on an allowed list (or whitelist.) This is relatively easy to maintain and validation against an established case (e.g. what business need is there for attachment type a, b or c to be transmitted) can occur on a case by case basis. anti-virus and anti-spam measures must not provide an avenue for indirect but disruptive attacks, e.g. flooding users with alerts and rejection messages. If message alerts are used they should: Provide only minimal information. Not be sent to the originator of the - this may lead to information leakage through error messages. Commercially available services offering real time updates to services with critical or 0-day (zero-day) signatures can sometimes prevent the newest types of viruses getting through the gateways. Signatures for protection and gateway devices require updating as frequently as possible. Standard commercial services can offer hourly push updates to ensure maximum protection. Alternatively, commercial 3 rd parties exist that provide services for scanning inbound/outbound for viruses/malware/phishing scams and so forth. These systems work by having all routed via the service provider and scanned prior to onward delivery to its destination. For NHS organisations, it is the recommendation of the NHS CFH Infrastructure Security Team that the services of NHSMail are used. As well as providing a standard platform based on Exchange 2007, NHSMail provides facilities to detect and respond to malware and spam, attachment blocking and other such services. More information can be obtained from: Crown Copyright 2010 Page 13 of 29

14 3.4 File Servers, Standalone Servers and Anti-Virus Exceptions Apart from dedicated servers (e.g. gateway and systems), there are often cases in which an anti-virus solution is desirable but due to possible impacts on availability and performance of systems, prior consideration is necessary. Cases may also exist where certified devices may not support additional software due to their intended purpose, e.g. certified medical devices 4. On Access scanning or memory resident detection mechanisms may adversely affect high volume servers that demand high availability though enterprise class anti-virus solutions can go some way to alleviating these concerns. There is also the possibility that specific files/directories could be excluded from the scanning regime such that performance is not affected. For example, Microsoft makes specific recommendations in relation to SQL Server and the types of files and location of directories which can be excluded from scanning so as not to impact the system performance. 5 It should be noted however that excluding files and directories means that should excluded files/directories become infected, the anti-virus solution will not detect the infection. There will always be some areas unable to support anti-virus, either through incompatibility with appropriate class software or performance impacts. In such cases it is often useful to run scheduled scans as frequently as possible during time periods when resource demand is low. If the system will not support this, scheduled maintenance periods will be necessary to perform comprehensive and complete systems scans. Systems which, due to restrictions, are unable to adopt appropriate anti-virus measures should be isolated from the network using measures as detailed in those Good Practice Guidelines relating to secure Local Area Network (LAN) environments. 6 Additionally, these devices require monitoring through increased auditing and possibly Intrusion Detection Systems (IDS) and/or Intrusion Prevention Systems (IPS). 3.5 Instant Messaging Services Instant Messaging services are now readily available through Internet Service Providers (ISPs), commercial suppliers and often internally within organisations. 4 The Patch Management GPG provides additional information including statements from the MHRA on such devices For a complete list of Good Practice Guidelines see Crown Copyright 2010 Page 14 of 29

15 These services allow users to chat in real time, while also giving them the ability to share files and workspaces. It is this ability to transmit files, and the possibility that any such transmissions may bypass established controls, that make instant messaging services a significant problem area for those tasked with protecting a system from virus infection. Many anti-virus manufacturers have responded to this situation (via integration with messaging products or file analysis) with solutions that provide real time monitoring of files within instant messaging systems. For those using externally provided IM systems (such as those from Microsoft, Google or Yahoo for example), there is the additional problem of IM spam and possible phishing attacks. If organisations use internal IM systems, they should investigate the features and facilities provided by the software manufacturer which can be turned on to minimise the possibility that malicious files could be shared. Unless absolutely necessary for business functions, the transfer of files using instant messaging services should be disabled and more robust methods utilised as an alternative. For example, the NHS Secure File Transfer Service can be used. More information is available at: (N3 connection required.) 3.6 Anti-Virus Policy Although many threats can be combated using technology, the key to a robust anti-virus policy is empowering each user with the necessary knowledge to help prevent virus outbreaks. An anti-virus policy may be a separate entity or integrated within an overall IT policy. In either case, it should contain a version of the following points: Do not open attachments from unknown senders. Do not download software to corporate hardware. Do not install software, unless provided by your IT department. Report any suspicions relating to viruses or malicious software to your IT department immediately. Crown Copyright 2010 Page 15 of 29

16 Never disable any anti-virus software on your machine or prevent it from updating 7 Users should be aware of the policies in place. Regular bulletins to staff should inform them of any new information or updates to policy. Disciplinary action should be taken against employees who wilfully break the policy (e.g. disabling anti-virus software or attempting to remove it from their machine.) 7 Technical means should be put in place to ensure that users cannot disable or interfere with anti-virus software. Ideally, this is best implemented by ensuring the principle of least privilege is implemented on user desktop systems. (I.e. users are not local administrators on their machines.) Crown Copyright 2010 Page 16 of 29

17 4 Malware and Spyware Due to the many possible methods of infection by malware and spyware, an effective anti-malware strategy requires equally varied levels of protection. Many types of malware application collect information which may be valuable to vendors of those applications, such as browsing habits or the popularity of certain products. This information can then have resale value to the vendor for marketing purposes and can be sold on to other companies. More sensitive information can also be stolen by such software including credit card numbers, credentials for online banking services (often via a keylogger) and so forth. Some types of malware once installed can be used to provide a remote control facility to attackers. Once installed, the users system becomes part of a larger group of compromised systems known as a botnet. These botnets are controlled centrally and can be used for a variety of purposes such as the sending of spam or for performing Distributed Denial of Service (DDoS) attacks on legitimate web sites. 4.1 User Education End user education is one of the most effective tools for the prevention of malware incidents. This should make sure that each user can recognise suspicious behaviour, will not attempt to circumvent technical solutions by installing unapproved software, open suspicious attachments or visit websites designed to spread malware. User education should be an ongoing activity and should begin when an employee joins an organisation. Multiple methods for educating users exist including using posters, desk drops, login banners/notices, formal training sessions and so forth. It is of vital importance that the education links in with the corporate policies on anti-virus, acceptable use and so forth. User education is a key weapon in preventing malware attacks. Whereas previously, visiting certain types of web site or malicious site could result in attempted infection via malware, there have been a growing number of incidents where legitimate and well known web sites have been used to spread malware due to elements of the sites being compromised. The proper policy and procedure regarding malware might include reference to: Identifying suspicious attachments. The reporting procedure for possible incidents. Crown Copyright 2010 Page 17 of 29

18 The types of websites which attempt to install malware covertly. How suspicious behaviour in software can indicate a malware presence. 4.2 Technical Solutions Solutions offering varying levels of protection and monitoring of malware behaviour are widely available. However, due to the covert nature of their existence, detection of new types of malware can be difficult. When searching for an infection, it is advisable to monitor patterns of behaviour rather than attempting direct discovery of the software in the first place Active Monitoring Active monitoring of user machines provides real time protection against malicious processes. There are various, freely available software products that can actively probe all applications running on a machine which can offer some protection against this type of attack. If an application demonstrates behaviour indicating the presence of malware, this type of software should prevent the application starting. Active monitoring software should include the following features: Active process monitoring. Signature based detection. Behaviour based detection. Application/Process quarantine. Crown Copyright 2010 Page 18 of 29

19 4.2.2 Passive Network Monitoring Monitoring at the network level can include Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) or basic traffic monitoring at the firewall. Seeking evidence of malicious connection attempts by compromised machines, from analysis of captured firewall logs, can offer opportunities for taking corrective action. Many vendors supply management software that will perform anomaly based detection of suspicious or malicious activities through active monitoring of log files and traffic reporting information. Some open source IDS software can accept multiple streams of information and provide suspicious traffic alerts based on signatures. Similarly, network monitoring tools can monitor network health and alert network administrators if they detect increased or unusual traffic behaviour on the network fabric. Some software offers traffic blocking functionality based on established block lists. If used in conjunction with traffic logs, the source machine and the type of software can be identified and proper action taken. Block lists need to be up to date to ensure that legitimate traffic is not accidentally blocked, or suspicious traffic allowed (due to the source machine trying new destinations in an attempt to send captured data). Crown Copyright 2010 Page 19 of 29

20 4.2.3 Desktop Security Policies Combining technological solutions with user education policies can be an extremely effective solution in preventing potentially hostile applications from installing and running covertly on a system. Desktop policies require the attention of every user and should offer guidance on how to conduct day to day business without exposing the company to unnecessary risks. The use of technology to enforce certain desktop policies can be a useful guarantee of policy compliance. This could encompass remote auditing or even operating system specific tools that restrict some user activities. A basic desktop policy should include: Ensuring that user accounts on systems provide the minimum level of privilege required by the user for their role. Ideally, no user should possess local administrator privileges on their computer. Preventing users from installing or executing unapproved software. Auditing all desktop systems for unapproved software. Control of network based resources. User responsibility for the use and/or misuse of business assets. Control of unauthorised USB devices Crown Copyright 2010 Page 20 of 29

21 5 Phishing and Scams Social engineering techniques may attempt to convince users to open attachments that will spread malware infections, or even to divulge sensitive information such as passwords by replying to hoaxes. 5.1 User Education While technological solutions can alleviate some of the risk surrounding scams (such as spam traps, spam & phishing filters and the like), the most effective defence is user education. Users should be aware of suspicious s and have the knowledge to identify risks; including knowing that a well executed hoax or scam can look entirely legitimate and professional. Users should also be able to recognise important markers such as: Large non-related distribution lists. Requests for information not normally divulged. Attachments where the icon does not match the supposed file type. Large numbers of spelling mistakes Grammatical errors which would be considered abnormal in commercial communications URLs to websites within s where the URL and displayed web address text are different URLs within s which look similar to the URL of the real web site but are subtly different (e.g. small alterations to the domain name etc.) While there are many different subjects, and equally varied formats, for scam and hoax s, they often follow similar patterns. The following examples are a representative selection only: The 419 Scam Named after the specific Nigerian criminal code it violates, the 419 scam has had extensive exposure in the press. Typically revolving around the international transfer of large sums of money, the sender requests that the user divulges Crown Copyright 2010 Page 21 of 29

22 sensitive information (e.g. bank account details) and/or makes upfront monetary payments Pyramid Schemes, Chain Letters & Fake Notifications A common technique initially used to harvest valid address s for spam operations. The scammer persuades the user (using financial incentives) to visit malicious websites or otherwise tricks them into running malware infected attachments. A well publicised example of this type of scam consisted of an sent to many thousands of people, requesting money for an orphaned terrorist attack victim. Many people entered their bank details to pledge money, it was only later that the subterfuge was discovered and that those who responded had revealed their bank details to criminals. A variant on the above is the fake notification which claims that it comes from the users bank and states that the users account will be closed unless the user goes to a web site and verifies their details. These types of scam can often be spotted because the fake banking web site linked to requests information which a bank would never ask for such as PIN number and National Insurance number Current News Hoax Attackers also use s claiming to contain detailed information on worldwide issues, and popular and/or breaking news stories to spread viruses, trojans or spyware. They can achieve this by tricking users into running malware applications after masking them within what seems to be a potentially useful utility. A related type of hoax is that which arrives in an and claims that a file on the user s computer is a virus and provides instructions on how to remove the infected file. These types of hoax also state that the user should forward the e- mail to all contacts in their address book. The file in question referenced in these hoaxes is usually a system file and therefore benign. An example of this type of hoax is the infamous Teddy Bear virus Fake Security software hoax A recent trend has been the emergence of fake security software. The normal delivery mechanism for such software is via adverts in legitimate web sites or by visiting certain types of web site. Normally, a pop-up dialog box will appear claiming that the user s PC is infected with viruses or malware and that by downloading and installing a piece of software they can run a more thorough check of their PC. Once the software is downloaded and installed, it pretends to 8 Crown Copyright 2010 Page 22 of 29

23 scan the PC and finds several examples of viruses and malware on the system. The software then requests payment (via credit or debit card) in order to remove the viruses and malware found. If the user does not pay for the software, it repeatedly generates pop up messages warning of virus and malware infection. Such software often contains techniques to thwart removal. Fake security software can often be detected and removed by legitimate anti-virus products Spear Phishing This is a type of targeted attack which can focus on specific individuals within an organisation. The individuals who are the targets are often those who are very senior within an organisation or whom an attacker would consider to have access to sensitive and valuable information. Alternatively, targets may be considered or known to be high net worth individuals. Spear Phishing attacks often take the form of an which attempts to coerce the recipient into either installing or downloading a piece of software. Once the software is installed, it can monitor keystrokes, spy on and relay sensitive information viewed by the target and so forth. These s can often appear to come from senders that the recipient may have communicated with in the past or may even trust. Thus, such attacks can be very difficult to spot indeed. There have also been cases of new (often 0 day ) vulnerabilities being used in spear phishing attacks. Vulnerabilities in Acrobat Reader and Microsoft products have been targeted in this way as it is more likely that the attack will not be detected by anti-virus or anti-malware products and will not have been patched. User education and awareness training is the best way to detect spear phishing attacks and the advice given in the User Education section above will be of benefit. A useful website which provides further information on identity theft, phishing, scams and hoaxes is Get Safe Online. See: Technical Solutions Due to the complex nature and diverse subject matter of based hoaxes and scams, software designed to prevent this problem may either produce too many false positives or not be effective enough. However, many technological solutions are available which offer an additional layer to user education. Some features which should be included in hoax or spam monitoring solution would be: Crown Copyright 2010 Page 23 of 29

24 Keyword Searching. Domain blocking of common hoax sources. Statistical analysis of content. Attachment filtering. In addition, applications themselves now contain filters which aim to look for the signs of phishing scams in s received. Any suspected s are flagged for the user s attention and moved to a special folder within the software. Whilst these solutions are not infallible, they do provide an extra layer of defence and along with gateway measures and user training are worth using. Software manufacturers of applications additionally provide updates for these filters to further improve their detection capabilities. The deployment of software which analyses the content of s for particular words or patterns (in conjunction with robust anti-virus software) should further increase the effectiveness of blocking the type of hoaxes which attempt to convince the user to execute malicious software. Crown Copyright 2010 Page 24 of 29

25 A Appendix A - Suggested Attachment Block List Below is a list of suggested blocked file types in attachments. To discover the use of particular file extension Internet resources such as may be useful in associating file types with the relevant program. Please note that the following is not a comprehensive list and is subject to change. 9 File Name Extension.ade.adp.app.asp.bas.bat.cer.chm.cmd.cnt.com.cpl.crt.csh.der.exe File type Access Project Extension (Microsoft) Access Project (Microsoft) Executable Application Active Server Page BASIC Source Code Batch Processing Internet Security Certificate File Compiled HTML Help DOS CP/M Command File, Command File for Windows NT Help file index Command Windows Control Panel Extension (Microsoft) Certificate File csh Script DER Encoded X509 Certificate File Executable File 9 List taken from: These attachment types are blocked by default in Outlook Crown Copyright 2010 Page 25 of 29

26 File Name Extension.fxp.gadget.hlp.hpj.hta.inf.ins.isp.its.js.jse.ksh.lnk.mad.maf.mag.mam.maq.mar.mas.mat.mau File type FoxPro Compiled Source (Microsoft) Windows Vista gadget Windows Help File Project file used to create Windows Help File Hypertext Application Information or Setup File IIS Internet Communications Settings (Microsoft) IIS Internet Service Provider Settings (Microsoft) Internet Document Set, Internet Translation JavaScript Source Code JScript Encoded Script File UNIX Shell Script Windows Shortcut File Access Module Shortcut (Microsoft) Access (Microsoft) Access Diagram Shortcut (Microsoft) Access Macro Shortcut (Microsoft) Access Query Shortcut (Microsoft) Access Report Shortcut (Microsoft) Access Stored Procedures (Microsoft) Access Table Shortcut (Microsoft) Media Attachment Unit Crown Copyright 2010 Page 26 of 29

27 File Name Extension.mav.maw.mda.mdb.mde.mdt.mdw.mdz.msc.msh.msh1.msh2.mshxml.msh1xml.msh2xml.msi.msp.mst.ops.osd.pcd.pif File type Access View Shortcut (Microsoft) Access Data Access Page (Microsoft) Access Add-in (Microsoft), MDA Access 2 Workgroup (Microsoft) Access Application (Microsoft), MDB Access Database (Microsoft) Access MDE Database File (Microsoft) Access Add-in Data (Microsoft) Access Workgroup Information (Microsoft) Access Wizard Template (Microsoft) Microsoft Management Console Snap-in Control File (Microsoft) Microsoft Shell Microsoft Shell Microsoft Shell Microsoft Shell Microsoft Shell Microsoft Shell Windows Installer File (Microsoft) Windows Installer Update Windows SDK Setup Transform Script Office Profile Settings File Application virtualized with Microsoft SoftGrid Sequencer Visual Test (Microsoft) Windows Program Information File (Microsoft) Crown Copyright 2010 Page 27 of 29

28 File Name Extension.plg.prf.prg.pst.reg.scf.scr.sct.shb.shs.ps1.ps1xml.ps2.ps2xml.psc1.psc2.tmp.url.vb.vbe.vbp.vbs File type Developer Studio Build Log Windows System File Program File MS Exchange Address Book File, Outlook Personal Folder File (Microsoft) Registration Information/Key for W95/98, Registry Data File Windows Explorer Command Windows Screen Saver Windows Script Component, Foxpro Screen (Microsoft) Windows Shortcut into a Document Shell Scrap Object File Windows PowerShell Windows PowerShell Windows PowerShell Windows PowerShell Windows PowerShell Windows PowerShell Temporary File/Folder Internet Location VBScript File or Any VisualBasic Source VBScript Encoded Script File Visual Basic project file VBScript Script File, Visual Basic for Applications Script Crown Copyright 2010 Page 28 of 29

29 File Name Extension.vsmacros.vsw.ws.wsc.wsf.wsh.xnk File type Visual Studio.NET Binary-based Macro Project (Microsoft) Visio Workspace File (Microsoft) Windows Script File Windows Script Component Windows Script File Windows Script Host Settings File Exchange Public Folder Shortcut Crown Copyright 2010 Page 29 of 29

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

Trust Informatics Policy. Information Governance Department. Computer Antivirus Management Policy

Trust Informatics Policy. Information Governance Department. Computer Antivirus Management Policy Document Control Trust Informatics Policy Information Governance Department Computer Antivirus Management Policy Document Title Author/Contact Computer Antivirus Management Policy Pauline Nordoff-Tate,

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Proxy Services: Good Practice Guidelines

Proxy Services: Good Practice Guidelines Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:

More information

Anti-Virus Policy. Computing and Networking Services (CNS).

Anti-Virus Policy. Computing and Networking Services (CNS). Anti-Virus Policy Reference: CNS-P-I-ANTIVIRUS Revision: A Supersedes: Purpose: Source: None CNS is to provide a computing network that is virus-free. The purpose of this policy is to provide instructions

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

STANDARD ON CONTROLS AGAINST MALICIOUS CODE EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMAN RESOURCES AND SECURITY Directorate HR.DS - Security Informatics Security Brussels, 21/06/2011 HR.DS5/GV/ac ARES (2011) 663475 SEC20.10.05/04 - Standards European

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link) NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions

More information

Reducing the Cyber Risk in 10 Critical Areas

Reducing the Cyber Risk in 10 Critical Areas Reducing the Cyber Risk in 10 Critical Areas Information Risk Management Regime Establish a governance framework Enable and support risk management across the organisation. Determine your risk appetite

More information

Spyware: Securing gateway and endpoint against data theft

Spyware: Securing gateway and endpoint against data theft Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

E-Mail, Calendar and Messaging Services Good Practice Guideline

E-Mail, Calendar and Messaging Services Good Practice Guideline E-Mail, Calendar and Messaging Services Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0017.01 Prog. Director Mark Ferrar Status

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Using a Firewall General Configuration Guide

Using a Firewall General Configuration Guide Using a Firewall General Configuration Guide Page 1 1 Contents There are no satellite-specific configuration issues that need to be addressed when installing a firewall and so this document looks instead

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

The Advantages of a Firewall Over an Interafer

The Advantages of a Firewall Over an Interafer FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

Countermeasures against Bots

Countermeasures against Bots Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer

More information

Email Security - A Holistic Approach to SMBs

Email Security - A Holistic Approach to SMBs Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new

More information

BitDefender for Microsoft ISA Servers Standard Edition

BitDefender for Microsoft ISA Servers Standard Edition BitDefender for Microsoft ISA Servers Standard Edition Copyright 2006 SOFTWIN Edition 1. How Does It Work? As content entering or leaving your company must meet security policies, it is crucial to choose

More information

Top five strategies for combating modern threats Is anti-virus dead?

Top five strategies for combating modern threats Is anti-virus dead? Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Network Address Translation (NAT) Good Practice Guideline

Network Address Translation (NAT) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005

THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Is your data secure?

Is your data secure? You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Payment Fraud and Risk Management

Payment Fraud and Risk Management Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

WHITE PAPER. Understanding How File Size Affects Malware Detection

WHITE PAPER. Understanding How File Size Affects Malware Detection WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through

More information

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details

Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details CYBER SECURITY OPERATIONS CENTRE 13/2011 21 July 2011 Strategies to Mitigate Targeted Cyber Intrusions Mitigation Details INTRODUCTION 1. This document provides further information regarding DSD s list

More information

ANTIVIRUS BEST PRACTICES

ANTIVIRUS BEST PRACTICES ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject

More information

Spyware. Summary. Overview of Spyware. Who Is Spying?

Spyware. Summary. Overview of Spyware. Who Is Spying? Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

Malicious Email Mitigation Strategy Guide

Malicious Email Mitigation Strategy Guide CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Best Practices for Deploying Behavior Monitoring and Device Control

Best Practices for Deploying Behavior Monitoring and Device Control Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...

More information

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor. Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection

More information

24/7 Visibility into Advanced Malware on Networks and Endpoints

24/7 Visibility into Advanced Malware on Networks and Endpoints WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Quarterly Report: Symantec Intelligence Quarterly

Quarterly Report: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Quarterly Report: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Contents Symantec

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

IBM Protocol Analysis Module

IBM Protocol Analysis Module IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network

More information

Why The Security You Bought Yesterday, Won t Save You Today

Why The Security You Bought Yesterday, Won t Save You Today 9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Basic computer security

Basic computer security Mag. iur. Dr. techn. Michael Sonntag Basic computer security E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1 Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

IBM Endpoint Manager for Core Protection

IBM Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information