* Avoiding viruses This is part three of a three-part series looking at the various areas we need to be concerned about in protecting our networks. Last issue, we talked about maintaining the infrastructure, or patch management, security updates, and downloads. Today, our subject is “disease prevention” or dealing with viruses and their ilk.Most viruses today are introduced as e-mail attachments, or links within HTML-enabled e-mail (which, in a text-based e-mail client is often rendered as an attachment, so there’s little difference in how to handle them). If you’re fortunate enough to have a colleague who is the e-mail manager/administrator then you probably think it’s their job to handle the e-mail-distributed viruses. It is, of course, but that doesn’t relieve you of the responsibility of protecting the servers and clients on your network. Should a virus escape from e-mail “captivity,” then it’s your problem once again.Viruses are still spread the way they always have been – through software applications. The tricky part has always been how to get the unsuspecting user to execute the application that launches the virus. Outlook’s “user friendly” attributes also make it “virus friendly,” unfortunately. But security (and halting viruses is a security issue) and user friendliness have always been conflicting goals. Microsoft has amassed a lot of good material to help you cope with viruses. A good place to start is at https://www.microsoft.com/technet/security/virus/ – although most of its links are information specific to a particular virus or worm. Nevertheless, reading about the Sobig virus and Code Red worm will give you some insights into best practices and designs to prevent future, similar attacks.The bottom line for viruses, though, is simple: good anti-virus scanning tools. Constant scanning of incoming e-mail is a good place to start, but there should also be anti-virus scanning software installed (and running) on every computer in your network. It needs to be locked down so it’s always running and it needs to be hard to ignore or override. If you really need to know why, see this story (https://napps.nwfusion.com/compendium/archive/003362.html) from Adam Gaffin’s Compendium about the receptionist and the Sobig virus. Never underestimate the ability of your users to do damage to themselves and the systems they operate. Related content news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center news AWS and Nvidia partner on Project Ceiba, a GPU-powered AI supercomputer The companies are extending their AI partnership, and one key initiative is a supercomputer that will be integrated with AWS services and used by Nvidia’s own R&D teams. By Andy Patrizio Nov 30, 2023 3 mins CPUs and Processors Generative AI Supercomputers news VMware stung by defections and layoffs after Broadcom close Layoffs and executive departures are expected after an acquisition, but there's also concern about VMware customer retention. By Andy Patrizio Nov 30, 2023 3 mins Virtualization Data Center Industry Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe