| 2 minute read

Cybersecurity Measures That Get a C-

man hiding behind folders

Why Antivirus Protection Isn’t Enough.

As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity to peek over the makeshift boundary.

This is a lot like antivirus software. Minus the bathroom part.

Because of the evolution of cyber threats, like our folder barricades, antivirus software no longer offers the same protection it did in the ‘90s. Not only is cybercrime expanding, attackers themselves are becoming much more sophisticated.

Sophistication isn’t to say that these hackers are solely after large entities, like Equifax or the Democratic National Committee—it’s actually easier for them to target small- to medium-sized businesses (SMBs), and even easier to aim for individuals because every machine that’s connected to the Internet is at risk. Because not all computers are connected through secure servers, antivirus is still the basic security mechanism that every machine should have. It can still keep us safe to a certain extent.

Antivirus fights against malware and can detect suspicious behavior. But it doesn’t hold up as well to sneakier types of malware like ZACCESS, which performs its routines hidden from plain sight.

Also, according to a Popular Science interview with security experts, it’s not enough to just have antivirus software—it must be up to date. Threat information is often found in regular updates and, without that info, the software can’t fight against a potential threat. While IT departments or managed service providers (should) urge everyone in an organization to install regular updates, not everyone follows through.

No matter how up-to-date your software is, though—or how in tune your IT department is—if just one person in your organization downloads an infected file or clicks a harmful link, your security is compromised. Even if you get lucky and none of your employees ever click a link, hackers can often disable antivirus software and other computer security controls anyway.

For signs that your antivirus software has been compromised, check out our blog post “How Do I Know If I’ve Been Hacked?

If malicious software, or malware, does get through, antivirus software might not be able to detect it. Antivirus software isn’t exactly keeping up with malware’s pace. Antivirus relies on signature detection, which is created by cybersecurity companies after analyzing a new type of malware, but (due to innovation and sophistication) malware changes so rapidly now that the software is using outdated signatures to scan for threats.

While it’s important to start with antivirus software, it’s even more important to understand that additional security measures must be in place.

To find out how you can be sure your organization’s security isn’t stuck in the ‘90s, download our whitepaper, Top Security Trends Propelling Managed SIEM and Managed Detection and Response.

*If you were that scoundrel, this article is not for you.

 

Blog Articles

The CDK Incident and Recommended Actions from Avalon Cyber

Thousands of car dealerships’ operations slowed to a halt last Wednesday as their core dealer management system, CDK, shut down. CDK Global announced that they were investigating a cyber incident and “Out of an abundance of caution and concern for our customers, we have shut down most of our systems and are working diligently to get everything up and running as quickly as possible” according to spokesperson, Lisa Finney. The company said later that day that most of their critical systems were back online, but the next day they announced that another incident had happened.

Get Ready for the New 36-Hour Cyber Breach Notification Rule for Financial Institutions

If you’re in the financial sector, no doubt you’ve already heard, and hopefully, are prepared or preparing for, the new federal banking rule regarding cyber breach notifications. This new rule, which took effect April 1, 2022, with full compliance required by May 1, 2022, requires banking organizations and bank service providers to notify banking regulators within 36 hours after a notification event, which is the tightest timeframe in U.S. history.

Cybercriminals Never Sleep (And Neither Do We)

According to the latest cybersecurity industry research, market demand for Managed Detection and Response (MDR) services continues to climb. In fact, experts forecast that by 2024, 40% of midsize enterprises will use MDR as their only managed security service. That might sound like a large percentage, but because of the continued escalation of cyberattacks, more and more companies are realizing the importance of hiring experts to boost their cybersecurity posture.