Page 57 - index
P. 57







Theft of Data - Some types of malware allow data to be stolen from infected computers. Data
theft can occur in limited numbers of files or entire databases can be compromised. Malware
that steals data, such as personal information, is a large contributor to the extensive rise in
identity theft.

How to Prevent USB Infection

One of the most important steps in preventing USB infection is to use antivirus software on all
computers that will receive the device. As has been noted, even popular antivirus programs are
not always adequate for detecting more sophisticated malware threats.

However, by using additional antivirus software such as Immunet, which is compatible with other
antivirus programs, you can add an additional layer of protection to your systems. The
advanced technology of Immunet allows for much deeper and broader coverage so that the risk
of malware and virus infection is minimized.

Once you have Immunet installed on your system, either as standalone protection or as
complimentary added protection with other software programs, there are several steps you can
take to help maximize protection. For example, you should block USB access to a computer if
suspicious user activity has been detected, an end point for the USB has either allowed
unauthorized access or has already been infected, or detection of unauthorized data transfer
has occurred.

Further damage can be avoided by taking advantage of special antivirus software features,
some of which are available with Immunet. These steps include enacting USB use notifications
in real time, disabling, blocking and quarantining suspicious or detected user accounts,
workstations or devices, and activating automated reporting of USB usage to determine
patterns.

Other preventative methods can be used by companies with computer networks. Ensure that
workstation activity logs are monitored regularly, continuously monitor all workstation equipment
ports for USB usage, include an automatic mechanism that disables any USB drive of a
workstation that has been infected, and ensure that immediate alerts are generated for
unauthorized USB security breaches.

About the Author


Peter Davidson is a business analyst who loves to share entrepreneurship
and marketing secrets with the world. Overcoming business challenges is
his passion and he aspires to reach at the highest rung of this field.












I25B /1B>9>7C &171J9>5 M +5@D5=25B 49D9?>
?@IB978D K I25B 565>C5 &171J9>5 << B978DC B5C5BF54 G?B<4G945
   52   53   54   55   56   57   58   59   60   61   62