Blog

category filters go here

Cyber Essentials and Malware Protection 

 We are continuing our series of articles on the 5 keys controls required for Cyber Essentials Certification.  Today we are focusing on the standards requirements for Malware Protection. 

For an introduction to Cyber Essentials, please see here

For other articles blogs in our Cyber Essentials controls series please see:

 What is malware protection? 

The Cyber Essentials scheme requires malware protection to be in place for desktop computers; laptop computers; tablets; mobile phones.  

Malware, short for malicious software, is an umbrella term for a plethora of threats including viruses, trojans, spyware, worms, adware and the growing threat of ransomware.   Often malware gains entry to systems through human error:  a staff member clicks on an infected attachment, email or website. Malware protection works to defend your system from both known malware and suspicious software by stopping malicious code from damaging or accessing your network.   There are several elements required to establish robust malware defences, including: 

  • Anti-malware software  which will detect and disable malware  
  • Whitelisting – will allow only trusted software to run on your systems 
  • Sandboxing –  enables untrusted software to be tested in a restricted environment  

 Cyber Essentials requires you implement one of the above approaches. 

Malware protection as Managed Service 

Establishing an effective malware protection strategy can be challenging due to: 

  • The variety of products on the market – all making claims of success 
  • Interchangeable use of terms such as anti virusanti malwareanti spyware etc 
  • Uncertainty about the impact of software on system resources – the wrong products will slow your system 
  • Concern about software installation, configuration and management 

Our security specialists working across Edinburgh and Glasgow have the technical expertise and advanced industry knowledge required to identify the most effective and affordable products to manage your cyber-security.  We can install and configure the software to ensure optimum performance and make certain that updates and scans are completely automatically and managed centrally.  

 Our managed antivirus helps to keep both known and emerging malware off workstations and servers. Managed antivirus not only stays up-to-date with the latest threats using traditional signature-based protection, but also allows Red Mosquito to monitor your environment in real-time for any outbreak.   

 It is worth noting that while anti malware is essential it should be one element of a robust security system. 

No one tool can catch everything, which is why a multi-layered approach to cyber-security is essential.  It is always better to have more than one system in place to protect your company as each one will reduce the risk posed by a potential threat.   

As ACE Practitioners of Cyber Essentials, we can make sure your business meets the requirements of all 5 controls and guide you through the certification process.

Contact us today for more information on Malware Protection and Cyber Essentials.   

We provide IT Support across Glasgow, IT Support Edinburgh and central Scotland. 

typewriter

Is outdated technology costing your business money?

Is outdated technology costing your business money?  Unlike fine wine technology does not age well.  The rapid pace of change and short life cycle of some technology can lead many businesses to become overwhelmed with the prospect of change.    Older legacy systems may appear to still function well on the surface but unseen risks will develop below.  It may be tempting to turn a blind eye […]

What is two factor authentication?

For many years now, users have gained access to secure computing services by entering a user name and password.  This common everyday action for all of us, is called single factor authentication. While this approach has worked for a long time, it has now fallen prey to cyber criminals.  The surge in phishing attacks alongside […]

Cyber Essentials and Secure Configuration

  Cyber Essentials Certification requires 5 key cyber security controls to be in place.  This series of articles focuses on each control individually.  Today we are looking at: Secure Configuration  You can find an introduction to Cyber Essentials here. What is secure configuration?  Secure configuration is reached by choosing the most secure settings for your devices and software and managing […]