Select Page
Do you have a malware policy?

Do you have a malware policy?

Continuing our EstesCloud IT Security blog series on the importance of cyber security, which began with why you should write a security policy, we continue with our next edition about malware.

 

A server malware protection policy is designed to protect your systems from cyberattacks. Malware is software with the intention to damage or disable computers or computer systems. It can be code, spyware, cookies, viruses, worms, Trojan horses, and more that compromise your PC and possibly your whole network! They can be very expensive to correct, not just in lost productivity, but also in equipment restoration or replacement.

 

Malicious software typically enters in 6 ways:

  1. E-mail attachments
  2. E-mail links to suspicious websites
  3. Website surfing to problematic websites
  4. Website links to malicious sites
  5. Exploiting vulnerabilities in the hosts, communication networks or perimeter systems
  6. Convincing a user to install infected software/apps

 

How and why to create a malware policy

 

Just as with any policy, you will begin with the “Why”. Why are you creating the policy? Presumably it’s to minimize the likelihood and the subsequent impact of an infection.

 

Let’s begin with some more basic questions:

  • Who does it apply to?
  • What equipment is included?
  • What are we talking about?

 

We can then ask questions that lead to solid definitions:

  • What is malware?
  • What damage can it cause?
  • What is an anti-virus program?
  • What is filtering software?
  • How is the malware policy activated?
  • Where do we go for additional resources?

 

The malware policy itself can be stated in various ways:

  • What the anti-virus program is, who installs it and what devices require installation.
  • What to do in case of new devices, suspected infection, suspicious or problematic software links.
  • How and when scans should be run and if they are manual or automatically scheduled.
  • How the software should be monitored, updated and management of the required updates
  • Rules about installing applications, downloading information, updating software, and opening attachments.
  • The use of filtering programs such as website blockers and e-mail scanning.
  • Rules about spam, junk mail, chain e-mails, social sites and any other applicable areas of potential risk.

 

Then it might be a good idea to make a malware policy response plan

 

Sometimes all the policies, plans and procedures can’t stop a cyberattack, in which case you may consider a malware response plan. This response plan should be included as part of the malware policy.

 

The malware policy back up plan kicks into action when there is an infection or a threat. It is typically a flow chart of action steps to mitigate as much damage as possible.

Step 1: Determine if there is a threat and how significant it is.

Step 2: Isolate the problem. The solution may require blocking internet services or shutting down a server or workstation to prevent further infection.

Step 3: Remove the problem. This is what the anti-virus programs are designed for. It may simply be a scan, repair, re-installing the OS from original disks, or even replacement of equipment.

Step 4: Recovery. Once the problem has been isolated and eliminated, check the systems for any other problems. Depending on the depth of infection, you might consider the venerable “format C:” to remove most (but not all!) infections. Be careful you don’t re-infect your system as you restore data, and make sure you close the attack vector so you don’t get re-infected!  It is absolutely essential that your backup and disaster recovery plan be 100%, as some infections (like CryptoWall) cannot be removed!

Step 5: Communication. Talk about the malware was able to cause damage. Talk about the situation with users and make any needed adjustments with the IT company to avoid it happening again in the future.

 

The bulk of information involved in a malware policy is in the communication to users about what it is, how it can be prevented and what to do in case there is an infection. With EstesCloud Server Care, ClientCare, and our HIPAA Compliance Care antivirus and filtering software installed, incidents can be avoided and you’ll have support if there is an issue.

 

EstesCloud // Explore our Managed Services Solution:

CompleteCare: Maintaining your own IT infrastructure is expensive and frustrating. EstesCloud CompleteCare combines the benefits of our ServerCare and ClientCare programs into one comprehensive program that protects your entire IT infrastructure at a predictable fixed cost.  Let the EstesCloud team become your Trusted IT Advisor, so you can get back to growing your business.
Let’s start the conversation!


ServerCare: A proactive approach to IT that includes regular scheduled maintenance and monitoring is essential to maintaining a healthy network and a productive staff.
EstesCloud ServerCare will give you peace of mind knowing that our team is continually watching and caring for your servers.
Discover the Benefits of ServerCare.


ClientCare: Proactive support for your desktops, laptops, and mobile devices.  We provide all of the monitoring, patching, and security tools for your systems, plus full access to our help desk services 24/7/365.
EstesCloud ClientCare will ensure your valuable data is secure whenever and wherever it is needed.

Take control of your systems today.


ComplianceCare: Are you a medical provider under HIPAA or HITECH regulatory compliance? Are government auditors keeping you up at night? Our HIPAA IT Management Service will ensure you are HIPAA compliant.

For the health of your IT Enterprise.

Take the first step to reduce cost and increase the productivity of your business. Give us a call at 888.300.2340, and

Healthcare Cyber Security

Healthcare Cyber Security

Is your organization in the healthcare industry?

Are you worried, as a consumer, about your data being lost, stolen or publicized?

As a healthcare provider, are you concerned about the liability you could face as a result of an attack?

KPMG LLP, is an audit, tax and advisory firm helping their clients get insight so they can address industry specific concerns and opportunities. According to their 2015 Healthcare Cybersecurity Survey:

“Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG.

The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said.” [source:computerworld.com]

They stated the greatest risk in healthcare cybersecurity is in:

  • External Attacks
  • Sharing Data with Third-Parties
  • Employee Crime
  • Wireless Computing
  • And 27% from Inadequate Firewall protection

In February 2013, Red Spin, a Health IT security firm published a report that over 29 million patient records had been compromised due to healthcare cybersecurity breaches since 2009. Since then, we have experienced two of the largest known healthcare cybersecurity breaches. In the last two years, both CHS and Anthem were attacked.

In July 2014, the giant Community Health Systems (CHS) malware attack affected 4.5 million people. In February 2015, health care provider Anthem was hacked, impacting 80 million records, including the company’s own CEO. In both cases, it wasn’t medical information that was compromised, but rather patients’ private information including full names, addresses, social security numbers and more.

Spending has been increased to prevent attacks, but this trend is being seen more in large organizations rather than small ones. The small companies just don’t think it can happen to them, but when trends are showing high numbers of compromise and low confidence of protection, it is time to get support. A security audit to access the need and vulnerabilities of the systems is the first step.

If you are in the healthcare industry and are subject to HIPPA law compliance, it is critical to protect your client data from a healthcare cyberattack.

 

EstesCloud // Explore our Managed Services Solution:

CompleteCare: Maintaining your own IT infrastructure is expensive and frustrating. EstesCloud CompleteCare combines the benefits of our ServerCare and ClientCare programs into one comprehensive program that protects your entire IT infrastructure at a predictable fixed cost.  Let the EstesCloud team become your Trusted IT Advisor, so you can get back to growing your business.
Let’s start the conversation!


ServerCare: A proactive approach to IT that includes regular scheduled maintenance and monitoring is essential to maintaining a healthy network and a productive staff.
EstesCloud ServerCare will give you peace of mind knowing that our team is continually watching and caring for your servers.
Discover the Benefits of ServerCare.


ClientCare: Proactive support for your desktops, laptops, and mobile devices.  We provide all of the monitoring, patching, and security tools for your systems, plus full access to our help desk services 24/7/365.
EstesCloud ClientCare will ensure your valuable data is secure whenever and wherever it is needed.

Take control of your systems today.


ComplianceCare: Are you a medical provider under HIPAA or HITECH regulatory compliance? Are government auditors keeping you up at night? Our HIPAA IT Management Service will ensure you are HIPAA compliant.

For the health of your IT Enterprise.

Take the first step to reduce cost and increase the productivity of your business. Give us a call at 888.300.2340, and

Disaster Recovery: Is your backup really ready?

Disaster Recovery: Is your backup really ready?

How much fear is behind the tens of thousands of daily searches for backup disaster recovery?

How do you know your backup recovery will work? What will you be able to restore, really? Globally, the search is on for the best backup and disaster recovery solutions for businesses. As it becomes easier to create and share data, the need for backup services increases. Fortunately, new cloud computing technologies allow for endless data sharing and syncing, and these interactions can be protected by replication services.

Backup Recovery Cloud Computing Devices

 

(more…)