{"id":10,"date":"2005-06-07T00:40:00","date_gmt":"2005-06-07T04:40:00","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/2005\/06\/07\/anti-spy-ware-best-pratices\/"},"modified":"2022-12-30T11:45:03","modified_gmt":"2022-12-30T16:45:03","slug":"anti-spy-ware-best-pratices","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/anti-spy-ware-best-pratices\/","title":{"rendered":"Anti-Spyware Best Practices"},"content":{"rendered":"<p><span style=\"font-family: Symbol; font-size: 10;\"><span style=\"font-size: +0;\">\u00b7Anti Spy-ware Best Practices<a href=\"https:\/\/web.archive.org\/web\/20230522203515\/https:\/\/uscellphonedetective.com\/spyware\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-97187 \" title=\"Anti Spy-ware Best Practices\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyware.png?resize=131%2C82&#038;ssl=1\" alt=\"Anti Spy-ware Best Practices\" width=\"131\" height=\"82\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyware.png?resize=150%2C94&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyware.png?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spyware.png?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 131px) 100vw, 131px\" \/><\/a><\/span><\/span><strong>Make a spyware protection company policy.<\/strong> To protect your business&#8217;s best interests, anti-spyware protection should be required software on every computer.<\/p>\n<h3>Use more than one anti-spyware application<\/h3>\n<p>Regardless of what anti-spyware vendors claim, you almost always need more than one program to protect against a lot of adware and spyware. Experts say the best protection you can get is only probably around 70% using a combination of the two leading anti-spyware programs.<\/p>\n<h3>Use a centrally managed anti-spyware solution<\/h3>\n<p>Centrally managed software usually works best for companies with more than just a handful of computers. Spyware protection is no different. There are several vendors, such as <a title=\"Webroot\" href=\"http:\/\/www.webroot.com\/En_US\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Webroot<\/a> and CA, which offer such software. If you have roughly 10 or more <a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) Windows-based computers and want to save time, effort, and money in the long term, you should definitely consider this route.<\/p>\n<h3>Use a layered defense<\/h3>\n<p>The best defense against any information threat is a layered defense. You have a greater chance of defending against spyware if you use anti-spyware software combined with anti-virus software, personal <span style=\"text-decoration: underline;\">firewalls<\/span>, and host anomaly detection\/intrusion prevention software. You can even help prevent infections at the network perimeter by utilizing spam and content filtering for inbound emails.<\/p>\n<h3>Lockdown your systems<\/h3>\n<p>A spyware defense that deserves separate mention is to configure Windows and Internet Explorer to be more secure. There are simple things you can do that will make a world of difference. For starters, make sure your systems are configured to be &#8220;hardened&#8221; from the elements. Roberta Bragg has written extensively on this topic at <em><a href=\"https:\/\/web.archive.org\/web\/20080601052002\/http:\/\/searchwindowssecurity.techtarget.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\">SearchWindowsSecurity.com<\/a><\/em>. These hardening tricks are very easy to implement, and you can even push a lot of them out via Active Directory Group Policies.<\/p>\n<p>Also, configure Internet Explorer (or whichever browser you use) to have pop-up blocker protection. This feature is built into most new browsers, and there are several well-known third-party applications for this. A good one for Internet Explorer is the free Google toolbar. It not only blocks most pop-up ads that harbor spyware, it also serves as a quick and convenient way to perform Google queries while browsing the Internet.<\/p>\n<h3>Use a more secure browser<\/h3>\n<p>Internet Explorer is a huge target for pop-ups, phishing, executable code, and other hacker vectors. If possible, use a more secure Web browser such as Firefox or Opera. These browsers likely have 99% or more of the functionality your users need with less hassle.<\/p>\n<h3>Install anti-spyware protection <em>before<\/em> new computers are deployed<\/h3>\n<p>Rather than installing spyware protection and cleaning utilities after you suspect infections, put it on systems before they&#8217;re deployed into the wild. For existing systems, simply install your favorite anti-spyware application such as <a title=\"Spybot \u2013 Search &amp; Destroy\" href=\"http:\/\/www.safer-networking.org\/en\/home\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Spybot Search and Destroy<\/a>, <a title=\"Ad-Aware\" href=\"http:\/\/www.lavasoft.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Ad-Aware<\/a>, or <a title=\"CA Anti-Spyware\" href=\"https:\/\/web.archive.org\/web\/20120627005520\/http:\/\/www.ca.com:80\/us\/products\/detail\/CA-Anti-Spyware-for-the-Enterprise.aspx\" target=\"_blank\" rel=\"homepage noopener noreferrer\">PestPatrol<\/a> (or a combination of two or more). Let the software clean your systems and simply keep it running full-time in the background to act as a preventative layer to keep your systems protected.<\/p>\n<h3>Protect <em>every<\/em> Windows-based system on your network<\/h3>\n<p>Anti-spyware software is no longer just for workstations \u2013 it needs to be on servers, laptops, and any system running Windows \u2013 regardless of whether or not they are networked. Windows is the OS of choice for most spyware infections (at least for now) so make sure every single Windows-based system has protection.<\/p>\n<h3>Remote users might not be receiving updates<\/h3>\n<p>If you have remote users, remember that their systems may not be receiving the proper anti-spyware and other software updates.<\/p>\n<h3>Educate your users<\/h3>\n<p>User gullibility, ignorance, and carelessness are the main causes for infection. People clicking &#8220;yes&#8221; or &#8220;OK&#8221; in pop-up windows allowing software to be installed opens up the floodgates. Downloading and running seemingly innocuous programs doesn&#8217;t help the cause either. Educate your users on what to do and what not to do. Give them examples of what can happen when spyware infects a computer and how that relates to their everyday job functions. It&#8217;s amazing how much buy-in you can get using this technique.<\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The best defense against malware is a layered defense that use anti-spyware software combined with anti-virus personal firewall host anomaly detection software.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3281,1455,23,82,421,4,1454,1036,445],"class_list":["post-10","post","type-post","status-publish","format-standard","hentry","category-security","tag-3281","tag-ad-aware","tag-malware","tag-microsoft","tag-msft","tag-security","tag-spybot-search-destroy","tag-spyware","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":6,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10\/revisions"}],"predecessor-version":[{"id":130826,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10\/revisions\/130826"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}