Finally the help of IT is here

Blog of computer solutions.

Malware (The hidden "virus" in our company) and more.

Written by Xaus Xavier Nadal on October 6th, 2010

Good.

For years that malware is gaining ground on the virus. These little programs are causing havoc and cause more and more as companies are not fully protected against such threats.

Who had a time machine to go to that moment where he said we have to protect against malware before virus (truth is that viruses have done much damage, but we have already taken action on it by updating windows in the operating system , antivirus, perimeter firewalls, etc ... but what malware ?, we've done ?, web-filters that prevent or rather protect against malware downloads have installed, have put plugins to our antivirus to protect against malware, but and which we already have in our computers ?, we have to do?).

Every time we are more convinced that our companies are better protected than in the past but we think that the purpose of the virus is not disturbing the user or injecting traffic broadcast on a sensitive denial of service network (This has already happened to the story, though sure to find a feature to the matter), but get money, either by rootkits installed on our computers or different malware that makes downloads more malware and eventually generates a software that sends emails to your internal addresses sending spam from known addresses and making reverse engineering for the end user clicks on the link sent to you partner and transfer your keys to a web system created especially as a mere improved phishing and hidden on a web server within the organization.

"Deprotection there is currently before internal threats (within the organization) is crucial to product success malicious"

Clarify the issue:

That many perimeter protection with 10 layers of anti-spam systems, blacklist, IP reputation, anti-virus, etc .. will not be able to protect us if the email comes from an infected within our own lan computer or if the malicious web is opened in an IIS / Apache installed on a computer of any client who makes a web impersonation and it appears that the credentials are delivering this website are accurate for the certificate and traffic https but they really are stored and sent to a external address for a malicious agent created for this purpose purely profit.

I hope this verbiage that just blurted take effect in each of us and make us rethink on the security filters that currently have and we want to implement in the future and hopefully not too distant project focused on the LAN security not Perimetral .

Another day I will continue with it.

See you soon.

Related Posts Plugin for WordPress, Blogger ...
Tags: , , , , , , ,


Leave a Reply

XHTML: You can use in Original tags: <a href="" title=""> <abbr title = ""> <acronym title = ""> <b> <blockquote cite = ""> <cite> <code> <del datetime = ""> <em> <i> <q cite = ""> <s> <strike> <strong>

GTranslate Your license is inactive or expired, please subscribe again!