Home arrow HTML arrow 10 Tips for Beating Virus Threats

10 Tips for Beating Virus Threats

In this short but important article, Dan provides us with 10 invaluable tips to secure our networks -- proving that you can't rely on antivirus software alone!

Author Info:
By: Dan Verton
Rating: 4 stars4 stars4 stars4 stars4 stars / 4
January 26, 2003

print this article

In this short but important article, Dan provides us with 10 invaluable tips to secure our networks -- proving that you can't rely on antivirus software alone!In light of the ever-changing methods virus and worm writers use to propagate their malicious creations, security professionals can't rely on antivirus software alone. Although no company can ever be totally secure from future threats, there are practical, common-sense things that security administrators can do today that will go a long way toward lessening their organizations' susceptibility to viruses and worms.

The following is what professionals at the nation's largest antivirus and security firms recommend:
  • Install patches for all known vulnerabilities.
  • Ensure that end users haven't disabled antivirus software at the desktop.
  • At the network administrator level, ensure that the gateway shuts off certain file types, such as .exe or .vbp files. Associate .ebs extensions to open the Windows Notepad editor rather than launch a script.
  • Close any unused ports at the firewall.
  • Install antivirus software at all entry points and ensure that it's kept up to date across the enterprise.
  • Employ a Layer 7, full-inspection firewall. This may seem obvious, but many organizations don't do so.
  • Lock down wireless networks. These offer perfect openings for virus and worm writers to spread their creations.
  • Shut off unnecessary network services.
  • Beware of open shares and Web traversal vulnerabilities. Use strong passwords.
  • Know where mobile devices connect to your network. Even if they aren't targeted, they can carry infected files.

DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

All HTML Tutorials
More By Dan Verton

blog comments powered by Disqus

- Does HTML5 Need a Main Element?
- Revisiting the HTML5 vs. Native Debate
- HTML5: Not for Phone Apps?
- HTML5 or Native?
- Job Hunting? Freelancer.com Lists This Quart...
- HTML5 in the News
- Report: HTML5 Mobile Performance Lags
- The Top HTML5 Audio Players
- Top HTML5 Video Tutorials
- HTML5: Reasons to Learn and Use It
- More of the Top Tutorials for HTML5 Forms
- MobileAppWizard Releases HTML5 App Builder
- HTML5 Boilerplate: Working with jQuery and M...
- HTML5 Boilerplate Introduction
- New API Platform for HTML5

Watch our Tech Videos 
Dev Articles Forums 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Weekly Newsletter
Developer Updates  
Free Website Content 
Contact Us 
Site Map 
Privacy Policy 

Developer Shed Affiliates


© 2003-2018 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
Popular Web Development Topics
All Web Development Tutorials