While commercial security programs don't look like consumer software applications, they often use the same underlying scanning, heuristic and cloud back end as non-business programs. Despite their conceptual roots, every security program is different, or at least it uses different jargon to describe its attributes.
This checklist of the basics provides a good protective base for your business.
As its name implies, this feature examines incoming email attachments for malware, like hidden phishing attempts.
Ransomware works by encrypting a computer's drive before the user even knows it's been infected. While some security programs let you sector off areas that can't be encrypted for key data, behavioral monitoring can catch this type of attack.
This adjunct to security programs tries out unfamiliar apps in a secure area that can't interact more sensitive parts of the computer, limiting any potential damage. If the app proves dangerous, it can be quickly wiped.
With these attacks, code snippets directly invade the system's memory, causing havoc and potentially opening a door for the removal of data. The latest malware protection can find and eradicate these threats.
Macro and Script Attacks
This technique involves getting a potential victim to click on a link in an email or web site that then downloads identity-stealing code.
Data Shredder and Encryption
Every company has confidential material and using either file- or disk-level encryption can keep it secret. Shredding a file is more complete, because rather than only removing its file allocation table entry, this technique overwrites it several times to make the file disappear.
Even with the strongest malware protection, some systems get infected to the point where nothing helps. Run rescue software from a DVD or flash drive to start the system in a secure Linux environment and give it a complete cleaning.
Distributed Denial of Service, better known as DDOS, attacks occur when a series of systems or automated bots overwhelm your server with requests, often shutting the entire network down. The best server security software can respond to this type of attack.
Firewalls separate a system from the dangers of the online world. The best offer ultimate protection by blocking unauthorized data coming in and going out while allowing important data to pass unmolested.
While it might seem easier to deal with updates to the operating system and major apps on a system-by-system basis, it's better to deal with it on a fleet basis. That way, every system has the latest security software.
There are other features that are part of some packages, optional or set up with third-party service. Top of the list is a virtual private network, which creates an encrypted session for ultimate communications privacy. Short of that, some security solutions provide a hardened web browser that forces the use of an encrypted secure session, doesn't allow the use of browser add-ons and makes you use an encrypted keyboard to foil keylogger software.
Failing all else, a strong backup routine is the ultimate defense against an attack, although most companies either do it in-house or use a third party to supply this service. That's because you can roll the system back to the last clean archive prior to the attack and be up and running in just a short amount of time.