In this mini guide, you will learn how to prevent attacks as well as how to remove and stop the spread of virsues, spyware and Trojans. You will also receive best practices on smartphone security and antivirus and antispyware tactics.
Requires Free Membership to View
- Smart tactics for antivirus and antispyware
- Smartphone security: The threat of mobile malware
- Spyware protection and removal tutorial
- How to remove a Trojan downloader
- Short-lived Web malware: Fading fad or future trend?
- Can Trojans and other malware exploit split-tunnel VPNs
Video: Smart tactics for antivirus and antispyware
Antivirus has become a commodity service with vendors touting value-added features and the ability to protect other parts of the network, as well as stop and successfully remove malware, spyware and Trojans.
In this video, learn about antivirus and antispyware from an architectural perspective. Discover the benefits of standalone products vs. integrated suites, where antivirus and antispyware should sit on the network and how to approach implementation issues.
Smartphone Security: The growing threat of mobile malware
The increasingly pervasive use of wireless handhelds in the enterprise is just one reason why malware authors are getting serious about producing mobile malware.
Lisa Phifer details all the reasons why smartphone and PDA viruses and malware may be on the rise, and the measures enterprises can take to protect the sensitive data they often contain and stop the spread of malware -- including spyware, Trojans and viruses -- on their mobile devices.
Spyware protection and removal tutorial
This spyware protection and removal tutorial is a compilation of free resources that explain what spyware is, how it attacks, how to remove spyware from enterprise systems, and most importantly what enterprises can do to win the war on spyware.
How to remove a Trojan downloader
In this thread from the ITKnowledge Exchange, which has been one of our most popular articles for some time, read about some users problems and get tips and learn how to remove a Trojan downloader, how they install themselves, how they spread and how to avoid infecting other machines on a network.
Short-lived Web malware: Fading fad or future trend?
Marcos Christodonte II explains how short-lived Web malware works, and how enterprises can use Web filtering, honeytokens and good policy to mitigate the threat.
Can Trojans and other malware exploit split-tunnel VPNs
In this question and answer, Michael Cobb explains how Trojans and other malware can exploit split-tunnel VPNs and what you need to consider when making the decision to tunnel all traffic or implement split tunneling.
This was first published in October 2009
As spyware continues to threaten corporate infrastructures and data, it's important to learn how this type of malicious software works and how to defend against it.
Users have struggled with problems associated the viruses, Trojans, spyware and other malware for years to come – and the attacks are only advancing.
Attackers are increasingly spreading their malicious code through fly-by-night websites that seem legitimate to unsuspecting users, but are actually laden with malware.
The beauty of split tunneling is that an enterprise doesn't need to provide the general Internet access point for a VPN use, but split-tunnel VPNs can also provide a false sense of security.
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation