How should your staff respond to malware attacks?

In this week’s Toolkit Insider Series, we’ll be looking at the Controls Against Malicious Code Procedure from our Cyber Essentials Toolkit. Read on to find out who should be working on this procedure, the benefits of having it in place and the training you need to provide your staff on malware.

Enter CYBER20 at the checkout to receive 20% discount

The Cyber Essentials Toolkit

Built on expert knowledge gained from numerous cyber security implementation projects, this toolkit includes procedures and processes for ensuring that your Cyber Essentials controls deliver what they need to.

Controls Against Malicious Code Procedure
Who is responsible?

All users will have responsibilities when it comes to defending your software, data and systems from malware. If staff are not aware of the common themes of malware attacks or do not understand how to respond when one happens, it can result in costly and damaging effects.

All of your staff’s responsibilities should be stated in their user agreements, your Internet acceptable use policy and your email rules. A training manager should ensure all users have had the right training on anti-malware responses.

The benefits of a Controls Against Malicious Code Procedure

Kaspersky Lab’s in-lab detection technologies detected an average of 360,000 new malicious files per day in 2017. This is 11.5% up on the previous year and is the second year in a row this figure has grown. These figures suggest organisations are under threat from malware every day, which makes it vitally important to have a procedure in place that enables you to protect yourself from and respond to malicious software.

This procedure highlights what you need to consider when you are choosing an anti-malware system to fit the needs of your organisation. It will also help you identify what you need to include in your user training for all your staff.

Inside our Controls Against Malicious Code Procedure

Below is a sample of the Controls Against Malicious Code Procedure, highlighting what your staff need to know about malware.

Extract from the Controls Against Malicious Code Procedure.

 

Next week

Next week, we’ll look at the Software Updates and Patching Policy.

20% discount on all Cyber Essentials products

Throughout August, IT Governance Publishing is offering a 20% discount on all Cyber Essentials products, including the Cyber Essentials Toolkit. Just enter code CYBER20 at the checkout to receive your discount.

Find out more information about the Cyber Essentials Toolkit here.

See all our other Cyber Essentials products here.

Interested in this document?

To purchase the Controls Against Malicious Code Procedure separately, please contact us at team@itgovernancepublishing.co.uk.