Modern Security Tactics Fail To Protect Against Malware

HardOCP News

[H] News
Joined
Dec 31, 1969
Messages
0
It doesn't matter if you have the best security on the planet, as long as you have that one employee that clicks on everything they see on the internet, you'll never be safe from malware. :(

No matter if you work for a government contractor or a top legal firm, there's a good chance your company's computers are infected with malicious software. That's a conclusion reached by FireEye, a computer security analysis and consulting firm, which released on Thursday a new study detailing how most companies are more vulnerable than they may think.
 
I always said, "the weakest link to any secure system is the humans behind the computers"

It's simple. Every employee that needs internet access has two accounts and two computers. One internal intranet, the other for internet activities which contains absolutely no sensitive data....and neither the two shall cross on the same network circuits.
 
Every employee that needs internet access has two accounts and two computers. One internal intranet, the other for internet activities which contains absolutely no sensitive data....and neither the two shall cross on the same network circuits.

VM's are your friend :D
You don't need two computers.
 
VM's are your friend :D
You don't need two computers.

Uh, huh.. sure.. maybe if you have a 10Gb or higher link to each VM.

Or are you talking about running a VM on a local machine?

In that case, most users are too computer illiterate to ever be able to use a VM.
 
In that case, most users are too computer illiterate to ever be able to use a VM.

This, this, this. Anything that outside of "open web browser surf internet" is beyond what they are capable of doing, and I am not just being a dick saying that. It is the truth.
 
This, this, this. Anything that outside of "open web browser surf internet" is beyond what they are capable of doing, and I am not just being a dick saying that. It is the truth.

Working for large University with 80% of population including professors uses Mac products. I can concur.
 
Uh, huh.. sure.. maybe if you have a 10Gb or higher link to each VM.

Or are you talking about running a VM on a local machine?

In that case, most users are too computer illiterate to ever be able to use a VM.

Good luck explaining to the penny pinchers of your business why you need a $2000 spec machine to run "two" operating systems on the same computer. You'll just get a blank look and a firm "No"
 
Good luck explaining to the penny pinchers of your business why you need a $2000 spec machine to run "two" operating systems on the same computer. You'll just get a blank look and a firm "No"

Yep... and then they'll blame you and whine when they suffer millions in lost business, damages, repair, and data loss, should a breach ever end up occurring (odds are nowadays it will).
 
Just install adblock and scriptblock to all workstations and disable changes. No more malware, no more clicked ads/links.
 
I always said, "the weakest link to any secure system is the humans behind the computers"

It's simple. Every employee that needs internet access has two accounts and two computers. One internal intranet, the other for internet activities which contains absolutely no sensitive data....and neither the two shall cross on the same network circuits.

Except for when they get an email from a customer and click on the attachment thinking it's an order (it's not and installs a virus that's so new the AV software doesn't catch it).
 
You shouldn't need anything more than an admin password to block all malicious software. Companies need to learn to keep their browsers, email clients and other common interface well coded so there are no exploits which can circumvent control. There is no excuse fo a virus being able to infect a machine through an email attachment, as that person should not have admin rights and should have been told you don't ever type in an admin password for an email attachment stupid.
 
You shouldn't need anything more than an admin password to block all malicious software. Companies need to learn to keep their browsers, email clients and other common interface well coded so there are no exploits which can circumvent control. There is no excuse fo a virus being able to infect a machine through an email attachment, as that person should not have admin rights and should have been told you don't ever type in an admin password for an email attachment stupid.

You're kidding right?
 
No I am not kidding at all, but given the vagueness of your reply I can't say anymore.
 
You shouldn't need anything more than an admin password to block all malicious software. Companies need to learn to keep their browsers, email clients and other common interface well coded so there are no exploits which can circumvent control. There is no excuse fo a virus being able to infect a machine through an email attachment, as that person should not have admin rights and should have been told you don't ever type in an admin password for an email attachment stupid.


LOLWUT.jpg
 
Can any of you clowns explain to me why simply double clicking a file can give you a virus in a secure corporate setting? There is only one explanation ass hat programming on the part of the OS maker or email or web client.
 
Can any of you clowns explain to me why simply double clicking a file can give you a virus in a secure corporate setting? There is only one explanation ass hat programming on the part of the OS maker or email or web client.

Oh I dunno, virus's, adware, malware and self replicating "timer based" executable's that can easily auto run in the background without user interaction that have been around for...say...30+ years? :rolleyes:
 
Which is enabled by ass hat programming time to fix it.
 
Anti-virus software just uses blacklists to detect known threats and heuristic scanning to look for virus like patterns. This only really works for known threats and very limited set of unknown threats.

Instead the solution is to do whitelisting with something like Bit 9. It will only allow authorized software to run. If an employee clicks on every single .exe sent through email, nothing happens.
 
Back
Top