BANGALORE, INDIA: There are many weapons in the computer security arsenal, but if you want to defend your company's computers from the wide variety of security risks out there, just one isn't going to be enough. Each potential issue requires a protocol in place to protect your network from information theft, malicious code, and other vulnerabilities. These protocols should include antivirus, anti-adware, and anti-spyware software and policies to discourage downloading pirated content via the Internet.
Protective Measures Explained
There's a big difference between antivirus, anti-adware, and anti-spyware programs--each is designed to protect against one specific security risk and will not offer protection from others.
Antivirus software protects against malicious code, such as worms, Trojans, and other computer viruses. A virus can damage files on your computer, send your information elsewhere, or propagate to other computers on your network.
Anti-adware programs scan the computer and check for any installed scripts that are the result of an adware pop-up. Adware itself is typically just an advertisement, but they can also be infected with keyloggers or other spyware that activates and installs on a computer if the user clicks on the ad.
Anti-spyware programs scan a computer and remove the type of malware that is specifically created to spy on the computer user. Spyware comes in a variety of "flavors" and can not only send your information to a remote location but also change your computer settings to allow for outside access.
Also read: IT is an enabler of business strategy
Identity Theft and Security Risks
A recent study, conducted at Michigan State University, demonstrated that a multipronged approach is more effective when IT evaluated risk and mitigation factors. They discovered that anyone who accesses pirated music or software sites and graphic photos or video is more likely to be the victim of identity theft and that the use of anti-spyware, anti-adware, and antivirus software significantly reduced the risk of losing personal information. According to the authors, "You have a much better chance of not getting your credit card number stolen if you have all three forms of protective software."
Reducing Vulnerabilities on Work Computers
All employees should be safeguarding proprietary company information, processes, and other critical data, but without the best protections on their computers, it may be a futile effort. Through the use of a variety of computer security programs, in addition to policies prohibiting access to specific sites (or types of sites) on the Internet, businesses can prevent the loss of company files through theft or virus damage.
Source: www.midsizeinsider.com