Polymorphic malware is an increasingly prevalent cyber threat which simply cannot be countered by traditional signature-based security measures. Instead, strategic investment in behavioural-based security measures, combined with employee education and regular software updates, can be used to create a robust, multi-layered approach that's far more effective in today's cyber security climate. Below are three key areas where security efforts should be focussed:
-
Consistent cyber security training
A large number of successful cyber-attacks start with an employee unwittingly clicking on a phishing email or malicious file attachment. Consistent employee training helps educate employee on tell-tale signs of attempted attacks, which in turn can significantly reduce the number of breaches that allow polymorphic malware in to begin with.
-
Invest in behaviour-based detection tools
Polymorphic malware is specifically designed to evade detection by traditional antivirus tools. As such, investments in this area can be largely futile and a waste of money. Instead, organisations should focus on more advanced, behaviour-based detection techniques. These methods offer the ability to track the way data is accessed and used by employees over time, with any suspicious activity automatically flagged. Behaviour-based solutions, like endpoint detection and response or advanced threat protection, can also pinpoint threats in real time before any data is compromised.
-
Ensure software is always kept up to date
Perhaps the most straightforward way of improving security against malware is ensuring that software and applications used within the organisation are always kept up to date. Major software vendors, such as Microsoft, Apple and Oracle, regularly issue crucial security patches for new vulnerabilities discovered within their software. Failure to install these promptly creates breach windows that are open to exploitation from anyone with knowledge of the vulnerabilities. Despite this, it can often be days, weeks or even months before these patches are installed, creating unnecessary risk. All organisations, no matter how big or small, must adopt a 'patch early, patch often' mantra.
More articles by James
The Air-Gap Dilemma
QA Cyber Security Specialist, James Aguilan, looks at the methods through which air-gapped systems can be compromised.
26 March 2019Safeguarding your Digital Footprint
QA Cyber Security Trainer, James Aguilan, shares 6 tips that can help you safeguard your digital footprint.
05 March 2018Phishing Campaigns: Defending organisations against phishing
QA Cyber Security Trainer, James Aguilan, argues that understanding how to defend against phishing is of paramount importance…
15 February 2018Most common ways for thieves to steal your cryptocurrency
QA Cyber Security Trainer, James Aguilan, looks at how cybercriminals can steal your coins.
19 July 2018Is Mr Robot a good representation of real-life hacking and hacking culture?
QA Cybersecurity trainer James Aguilan looks at several scenarios featured in the hit US TV series Mr Robot – and how they ma…
19 February 2018How do organisations demonstrate accountability for GDPR compliance?
QA Cyber Security Trainer, James Aguilan, outlines steps towards demonstrating compliance with the GDPR.
20 March 2018Cyber criminals can exploit flaws in online security and all new appliances
QA Cyber Security Trainer, James Aguilan, looks at how internet-enabled devices such as fridges, doorbells and TVs are leavin…
22 May 2018Cryptocurrency Mining: Does the reward outweigh the cost?
QA Cyber Security Trainer, James Aguilan, looks at the practice of mining cryptocurrency.
27 March 2018Cryptocurrency in traditional crimes
QA Cyber Security Trainer, James Aguilan, looks at how cryptocurrency is used in crimes such as drug trafficking, money laund…
25 July 2018Business security challenges from the IoT
QA Cyber Security Trainer, James Aguilan, details the business security challenges when it comes to the exponential growth of…
03 July 2018