[pb_row ][pb_column span="span12"][pb_heading el_title="Step #7: Malware Prevention" tag="h1" div_margin_top="30" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Step #7: Malware Prevention[/pb_heading][pb_text el_title="Introduction" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

This section from within the NCSC's '10 Steps To Cyber Security' concerns Malware Prevention.

[/pb_text][pb_heading el_title="Summary" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Summary[/pb_heading][pb_text el_title="Summary" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

Malicious software, or malware is an umbrella term to cover any code or content that could have a malicious, undesirable impact on systems. Any exchange of information carries with it a degree of risk that malware might be exchanged, which could seriously impact your systems and services. The risk may be reduced by implementing appropriate security controls as part of an overall 'defence in depth' approach.

[/pb_text][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_heading el_title="What is the Risk?" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]What is the Risk?[/pb_heading][pb_text el_title="What is the Risk?" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

Malware infections can cause material harm to your systems. This might include disruption of business services, unauthorised export of sensitive information or loss of access to critical data (eg caused by ransomware).The range, volume and source of information exchanged (as well as the technologies used) provide a range of opportunities for malware to be imported. Examples include:

  • Email: Email still provides a primary path for internal and external information exchange. Malicious email attachments can cause their payload to be executed when the file is opened or otherwise processed. Email with malicious content may be specifically targeted at known individuals (known as spear phishing) with access to sensitive information, or at roles with elevated privileges. Alternatively malicious email may include embedded links that direct users to websites hosting malicious content.
  • Web browsing: Users could browse (or be directed to) websites that may contain malicious content which seeks to compromise applications (such as the browser) that interact with that content
  • Web services: User access to social media and other web based services could provide an ability for users to import a variety of data formats 
  • Removable media and personally owned devices:  Malware can be transferred to a corporate system through the uncontrolled introduction of removable media or the direct connection of untrusted devices. This might include (for example) connecting a smartphone via a USB port, even if intended only to charge the device.

[/pb_text][pb_divider el_title="Divider 1" div_border_width="2" div_border_style="dotted" div_border_color="#00a9cb" appearing_animation="0" ][/pb_divider][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_heading el_title="How Can the Risk be Managed?" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]How Can the Risk be Managed?[/pb_heading][pb_text el_title="How Can the Risk be Managed?" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

Develop and implement anti-malware policies: Develop and implement corporate anti-malware policies and standards and ensure that they are consistently implemented across your infrastructure. The approach should be applicable and relevant to all business areas.

Manage all data import and export: All data should be scanned for malicious content at the network perimeter, whether that's internet gateways or facilities to introduce removable media.

Blacklist malicious web sites: Ensure that the perimeter gateway uses blacklisting to block access to known malicious web sites.

Provide dedicated media scanning machines: Stand-alone workstations can be provided and equipped with appropriate anti-virus products. The workstation should be capable of scanning the content contained on any type of media and inspect recursive content within files. Ideally every scan should be binded to a known user.

Establish malware defences: Malware can attack any system process or function so a technical architecture that provides multiple defensive layers (defence in depth) should be considered. This should include the following controls.

  • End user device protection: On many platforms host based malware protection is provided by using antivirus applications. However several platforms (such as some smartphones) meet the need to protect against malware using other mechanisms such as application whitelisting. For further information see the NCSC End User Device [External Link] guidance.
  • Deploy antivirus and malicious code checking solutions to scan inbound and outbound objects at the network perimeter. Where host based antivirus is used it may be sensible to use different products to increase overall detection capability. Any suspicious or infected malicious objects should be quarantined for further analysis.
  • Deploy a content filtering capability on all external gateways to try to prevent attackers delivering malicious code to common desktop applications such as the web browser.
  • Install firewalls where appropriate, configuring them to deny traffic by default.
  • If the business processes can support it, consider disabling certain browser plugins or scripting languages.
  • Where possible, disable the autorun function to prevent the automatic execution of malicious code from any type of removable media. Equally, if removable media is introduced, the system should automatically scan it for malicious content.
  • Ensure systems and components are well configured according to the secure baseline build and kept up to date. 

User education and awareness: Users should understand the risks from malware and the day-to-day processes they can follow to help prevent a malware infection from occurring. The user instructions should contain the following:

  • Try to stop and think before clicking on links, but don't worry if you think you've clicked on something harmful. Tell your security team as soon as possible and they will help.
  • Do not connect any unapproved removable media or personally owned device to the network.
  • Report any strange or unexpected system behaviour to the appropriate security team.
  • Maintain awareness of how to report a security incident.

[/pb_text][pb_heading el_title="Learn More" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]Learn More[/pb_heading][pb_text el_title="Learn More" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

Our End User Device Security Guidance[External Link] provides further guidance on managing the risk from malicious software on user devices.

[/pb_text][pb_divider el_title="Divider 1 2 3" div_border_width="2" div_border_style="dotted" div_border_color="#00a9cb" appearing_animation="0" ][/pb_divider][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_heading el_title="What Next?" tag="h2" text_align="inherit" font="inherit" border_bottom_style="solid" border_bottom_color="#000000" appearing_animation="0" ]What Next?[/pb_heading][pb_text el_title="What Next?" width_unit="%" enable_dropcap="no" appearing_animation="0" ]

IS Know How Pointer:

You may also be interested to read the next phase of the 10 Steps;

[/pb_text][pb_button el_title="What Next Button" button_text="Step #8: Monitoring" link_type="url" button_type_url="https://www.isknow.how/your-is-know-how/national-cyber-security-centre-ncsc/the-10-steps-are/10-steps-monitoring" open_in="current_browser" icon="fa-arrow-right" button_alignment="inherit" button_size="btn-lg" button_color="btn-primary" appearing_animation="0" ][/pb_button][pb_divider el_title="Divider 1 2 3 3" div_margin_top="20" div_border_width="2" div_border_style="dotted" div_border_color="#00a9cb" appearing_animation="0" ][/pb_divider][/pb_column][/pb_row][pb_row ][pb_column span="span12"][pb_alert el_title="Dislcaimer" div_margin_top="20" div_margin_bottom="-20" alert_style="alert-warning" alert_close="no" appearing_animation="0" ]


The above resources and content "Contains public sector information licensed under the Open Government Licence v1.0." unless stated with the text "IS Know How Pointer:" which is where ISKH would like to input a call to action to it's visitor's and clients.

ISKH is in no way affiliated with, or working on behalf of the National Cyber Security Centre (NCSC). ISKH is quite simply reproducing their 10 Steps to Cyber Security information, to be able to put it in front of our Third Sector target audience(s) as much as possible.

Additionally, this should further support the NCSC's drive to show that Cyber Security, has a positive impact on a business or organisations Cyber / Data Security Positioning.

Any externally linked NCSC content in the ISKH website, including PDF documents or video media, is offered for information purposes only, as is.