{"id":2884,"date":"2014-11-17T09:34:43","date_gmt":"2014-11-17T15:34:43","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=2884"},"modified":"2015-04-24T14:28:33","modified_gmt":"2015-04-24T19:28:33","slug":"are-malware-threats-making-antivirus-software-obsolete","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/are-malware-threats-making-antivirus-software-obsolete\/","title":{"rendered":"Is Antivirus Software Becoming Obsolete?"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2910 size-thumbnail\" src=\"\/blog\/wp-content\/uploads\/2014\/11\/virus-trojan-spyware-150x150.png\" alt=\"virus-trojan-spyware\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/virus-trojan-spyware-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/virus-trojan-spyware.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a title=\"CIFS Monitoring\" href=\"\/help\/stm_5_6\/monitor_file_directory_change.aspx\">Viruses, trojans, worms \u2013 malware<\/a> (a contraction of \u2018malicious software\u2019) come in many forms. Even though these threats have been around for decades, the volume has increased steadily in line with overall internet usage. What\u2019s more, just as the sophistication and capabilities of technology has improved over the years, so too has the proficiency of malicious programs. Indeed, if you aren\u2019t keeping your technology up-to-date, then you\u2019re leaving yourself compromised to the ever-increasing effectiveness of malware.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">According to the IT security organization <a href=\"http:\/\/www.av-test.org\/en\/home\/\" rel=\"nofollow\" target=\"_blank\">AV-Test<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, over 220,000 malicious software programs are detected every day. If you want to keep a close eye on daily detections, then head over to <a href=\"https:\/\/www.virustotal.com\/en\/statistics\/\" rel=\"nofollow\" target=\"_blank\">Virus Total<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, where a constantly updated graph shows the amount of threats found over the last 7 days.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2903 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/anti-virus-150x150.png\" alt=\"anti-virus\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/anti-virus-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/anti-virus.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">And this isn\u2019t even the whole picture. Not even the antivirus software installed on your computer can detect every threat that comes its way; depending on the software, the figure can even be <a href=\"http:\/\/techpageone.dell.com\/technology\/is-anti-virus-software-obsolete\/#.U_72VlZtdoH\" target=\"_blank\">as low as 60%<\/a>. And even if a threat is detected it is usually too late:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">\u201cMost anti-virus tools use signature files to detect viruses. But it is an \u2018after the fact\u2019 method: Only when new viruses are detected are they added to the malware lists.\u201d \u2013 <a href=\"http:\/\/techpageone.dell.com\/technology\/is-anti-virus-software-obsolete\/#.U_72VlZtdoH\" target=\"_blank\">Tech Page One <\/a><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">This means that if your computer or other hardware comes into contact with any new viruses, although your AV software may be able to detect them (though even this isn\u2019t certain), they will not be able to defend against the attack. Indeed, proactive detection, according to <a href=\"http:\/\/techpageone.dell.com\/technology\/is-anti-virus-software-obsolete\/#.U_72VlZtdoH\" target=\"_blank\">Drew Robb<\/a>, which \u201ccatches a virus before it infects your computer, is stalled at 80%.\u201d<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>How your computer is threatened<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/cyber-attack.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2904 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/cyber-attack-150x150.png\" alt=\"cyber-attack\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/cyber-attack-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/cyber-attack.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">So, what are the risks? What is all this malware out there designed to do, how does it do it, and what\u2019s the point?<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Well, firstly, it\u2019s not just your desktop that\u2019s vulnerable to malicious programs. Your laptop, tablet and smartphone a<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">re all potential targe<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">ts for viruses and hackers too. Cyber criminals are constantly on the lookout for ways in which they can steal your passwords, rob you <\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">of your online banking details, or otherwise <\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">exploit the informati<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">on on your machine for their financial benefit \u2013 and by installing viruses onto your computer is one of the ways in which they do this.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Cybercriminals have become more adept and organized at launching hit-and-run attacks than ever before, explains <a href=\"http:\/\/www.knowbe4.com\/\" rel=\"nofollow\" target=\"_blank\">Stu Sjouwerman of KnowBe4<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">\u201cFully professional eastern European cyber mafias have hired the best and brightest, and are innovating malware at a furious pace. Today, the bad guys raise a malicious website, run their attack and then disappear after a few hours \u2013 before [anti-virus] companies have updated their malware definitions.\u201d<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">These attacks come in many ways \u2013 below are just a few of them:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Phishing<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">P<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/phishing.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2907 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/phishing-150x150.png\" alt=\"phishing\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/phishing-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/phishing.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">hishing is a technique that cybercriminals have been increasingly adopting over the years. Not a virus as such, simply a scam \u2013 but precisely why any antivirus protection you have installed on your computer will be obsolete if you fall victim to the ploy.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">You\u2019ll receive an email from what looks like your bank. You click through to what appears to be your bank\u2019s websit<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">e, but is in fact just a very convincing facsimile. You\u2019re asked for your card number and password, and, if you type it in, all you\u2019re doing is handing this vital information over to the cybercriminal, giving them access to your real online banking account.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Drive-by Downloads<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">These <\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">i<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">nfect existing websites. However, if you visit that website (and you may be sent an email link encouragi<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">ng you to do so), it will proceed to install malware onto your computer.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Trojan Horse<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/virus.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2909 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/virus-150x150.png\" alt=\"virus\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/virus-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/virus.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">These little nasties are embedded into small online applications \u2013 often screensavers and such like. If you download the screensaver and install it onto your computer, you are also installing the malware that has been written into the application.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Persona<\/b><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>lized Trojan Horse<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">These trojans work in pretty much the same way as above, however you\u2019re personally targeted for the attack rather than it just being left to chance.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Again, it often works through the use of email. You will receive an email with a picture or other document attached (zip files are common). For whatever reason you\u2019re duped into opening the attached picture, thus opening the door for the malware to get into your computer.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Ransomware<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/cybercriminal.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2905 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/cybercriminal-150x150.png\" alt=\"cybercriminal\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/cybercriminal-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/cybercriminal.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">These usually use a delayed attack method, when sometime after you have downloaded a seemingly innocuous application or program \u2013 an update maybe, or even a ringtone \u2013 you suddenly see a pop up box on your computer. What you in fact downloaded was a piece of malware, and now the pop up box is telling you that it has locked down your computer \u2013 and it has.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">It will then demand money from you to unlock your files, quite often by sending a text with a given short code. Your phone provider will be billed the amount in question, who in turn will bill you at the end of the month, usually with a fine slapped on for good measure.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>So, h<\/b><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>ow much protection does antivirus software provide against these thre<\/b><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>a<\/b><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>ts?<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/what-to-do.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2911 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/what-to-do-150x150.png\" alt=\"what to do\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/what-to-do-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/what-to-do.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Simply put, not enough. Because of the sheer volume of malware out there floating around the commercial internet, anti-virus prog<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">rams alone are not enough to combat the problem. Indeed, some authorities, such as Mohammad Mannan, assistant professor at the <a href=\"http:\/\/www.ciise.concordia.ca\/\" rel=\"nofollow\" target=\"_blank\">Concordia Institute for Information Systems Engineering<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> in Montreal, have even gone so far as to suggest that they are \u201ctotally useless\u201d. Mannan again:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">\u201cIf you use [antivirus programs], you might even be vulnerable [to malware] to some extent.\u201d<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">It\u2019s a question of figures, and the sheer amount of threats that are out there \u2013 a number which has grown significantly in the past decade. <a href=\"http:\/\/www.cbc.ca\/news\/technology\/malware-threats-making-anti-virus-software-totally-useless-1.2559432\" rel=\"nofollow\" target=\"_blank\">CBC News<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> reports that in 2002 there were an estimated 17 million known \u201cgood\u201d files out there on the commercial internet, with antivirus engines detecting 2 million \u201cbad\u201d ones. By 2012 the amount of good files had grown to 40 million, and the nefarious ones to 80 million.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>The problem with antivirus software<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/problems-with-antivirus.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2914 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/problems-with-antivirus-150x150.png\" alt=\"problems with antivirus\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/problems-with-antivirus-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/problems-with-antivirus.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The sophistication of today\u2019s malware programs make it harder and harder for antivirus software to detect if there\u2019s a problem. Indeed, users often don\u2019t always even know that something phishy is happening on their comp<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">uters. <a href=\"http:\/\/www.avg.com\/gb-en\/homepage\" rel=\"nofollow\" target=\"_blank\">Tony Anscombe of AVG<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">\u201cMalware viruses used to be disruptive \u2013 if you got one, you knew you had it. Now, they\u2019re deceptive and hide in the background.\u201d<\/span><\/p>\n<p><a title=\"How to Choose the Best Antivirus Software for Your Situation\" href=\"https:\/\/www.poweradmin.com\/blog\/how-to-choose-the-best-antivirus-software-for-your-situation\/\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Antivirus software<\/span><\/a><span style=\"font-family: verdana,geneva; font-size: 12pt;\">, in face of these ubiquitous threats, has inevitably become a multi-billion dollar industry. One of the reasons for this, in fact, is because users have to have it continuously updated to keep ahead \u2013 or rather just behind \u2013 the sophistication of new<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"> malware threats. The problem is in the very nature of the antivirus software \u2013 it is reactive. It only responds to the specific malware that it is programmed to detect. All the cybercriminal has then<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"> to do is make some slight modifications to the malware code, and the antivirus program becomes obsolete aga<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">in.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The sheer number of malware variations make it effectively impossible for antivirus software to combat the problem. It just simply isn\u2019t possible to create a blanket program that keeps all threats out.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>So, what\u2019s the answer?<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Whitelisting<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/whitelisting.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2915 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/whitelisting-150x150.png\" alt=\"whitelisting\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/whitelisting-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/whitelisting.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Whitelisting, as you might expect, is the opposite of blacklisting. Since a blacklist of all of the malware sites in existence would, frankly, be far too difficult to compile, the answer, some believe, is in the creation of a whitelist, which contains only the approved \u2018safe\u2019 sites.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The principle is rather similar to what Twitter uses to verify celebrity accounts. Since there became a proliferatio<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">n of bogus celebrity accounts on the site, rather than identifying all the fake ones, Twitter simply offered a verification of the legitimate ones, so other users could tell the real from the fake.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Similarly, how whitelisting works is that when you surf the web, each time you visit a site a whitelist prompt <\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">appears in your browser, letting you know whether the site is whitelisted or not. It is then up to you as the user whether to use the <\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">site or escape from it.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Education<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/learn.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2906 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/learn-150x150.png\" alt=\"learn\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/learn-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/learn.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Malware is very often the result of user intervention \u2013 they may have clicke<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">d on a phishing link or opened an attachment. They may even have clicked through on something in social media which uses social engineering tactics (such as \u2018clickbait\u2019 \u2013 \u201cyou\u2019ll never believe what happened when \u2026\u201d) to entice the user to click. It\u2019s only by educating users on the risks, especially when it comes to businesses that must be compliant, that they\u2019ll be able to understand and resist clicking.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>File monitoring<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Managed IT services are now replacing the old \u2018break-fix\u2019 model where IT support companies would come and fix a problem after it had occurred. The power of the cloud and <a title=\"File and Directory Change Monitoring\" href=\"https:\/\/www.poweradmin.com\/help\/stm_5_6\/monitor_file_directory_change.aspx\">monitoring services<\/a> should be utilized wherever possible to stop malware entering the business environment and getting to the end user.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>So is<\/b><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b> it time to completely abandon antivirus software?<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/questions.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2908 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/questions-150x150.png\" alt=\"questions\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/questions-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/questions.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">No. Of course not. <a title=\"Choosing the Right Antivirus Software\" href=\"https:\/\/www.poweradmin.com\/blog\/choosing-the-right-antivirus-software\/\">Antivirus software<\/a>, although becoming increasingly outdated, still forms the first line of defense. It does no harm to have it installed on your computer, so there is no reason to remove it. It is rather like locking your front door and windows when leaving the house. Yes, burglars can still get in, but you\u2019re not holding the door open for them. They will have to be motivated, and you won\u2019t be as easy a target as the house next door who decided to remove all doors and windows altogether.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Indeed, <a href=\"http:\/\/techpageone.dell.com\/technology\/is-anti-virus-software-obsolete\/#.U_8N4VZtdoE\" target=\"_blank\">Sjouwerman agrees<\/a>:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">\u201cCompanies still should have [antivirus software] \u2013 at least for now, as well as firewalls, a strong whitelist strategy and user training.\u201d<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/how-safe-is-your-computer.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2913 size-thumbnail\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/how-safe-is-your-computer-150x150.png\" alt=\"how safe is your computer\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/how-safe-is-your-computer-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/11\/how-safe-is-your-computer.png 185w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">So, although not completely obsolete, antivirus software is certainly becoming less and less useful, and is almost definitely no longer effective to the extent that it can function as complete protection on its own. The advice is to keep using it, but bolster with other techniques, but the on-going war against malware and the cyber-criminal will not be won with antivirus software alone.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Viruses, trojans, worms \u2013 malware (a contraction of \u2018malicious software\u2019) come in many forms. Even though these threats have been around for decades, the volume has increased steadily in line with overall internet usage. What\u2019s more, just as the sophistication and capabilities of technology has improved over the years, so too has the proficiency of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2938,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,6,8],"tags":[],"class_list":["post-2884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-tech","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=2884"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2884\/revisions"}],"predecessor-version":[{"id":3444,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2884\/revisions\/3444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/2938"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=2884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=2884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=2884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}