Computer Parasitology: 8 Proactive Steps for Protection

##AUTHORSPLIT##<--->

Computer viruses have progressed from urban myth to major threat. Yet, even with all the damage they have done, they pale in comparison to what we have seen and have yet to see from the dreaded computer worm. Viruses are computer programs designed to spread themselves from one file to another on a single computer. Worms, on the other hand, intentionally infect as many machines as possible, leveraging a network medium such as e-mail. Computer worms pose a great threat to school network systems. Over the next decade they will change the nature of anti-virus software and require paradigm shifts in network infrastructure.

Here are eight proactive steps your institution can take for protection:

1. Run anti-virus software on servers, gateways and desktops.

2. Remove "all staff" addresses from your list. If users need to send a facultywide or studentwide e-mail, they can forward the e-mail to an administrator for posting.

3. Lock down all peer-to-peer networking. We recommend that administrators do this on all computers where it is not absolutely required.

4. Deploy internal firewalls. Corporate firewalls provide no benefit once a worm has entered the school network.

5. Disable e-mail script capabilities. If your groupware product supports e-mail scripting, this should be disabled for all but a few users.

6. Strip executable content from incoming e-mail. This will protect students and faculty from inadvertent worm or virus infections.

7. Use heuristics, and if possible, digital immune system technology. Heuristics can detect up to 90 percent of all new and unknown virus strains.

8. Update operating systems and application software regularly with their security patches.

-Sharon Ruckman
Senior Director
Symantec Security Response

Featured

  • AI-powered individual working calmly on one side and a burnt-out person slumped over a laptop on the other

    AI's Productivity Gains Come at a Cost

    A recent academic study found that as companies adopt AI tools, they're not just streamlining workflows — they're piling on new demands. Researchers determined that "AI technostress" is driving burnout and disrupting personal lives, even as organizations hail productivity gains.

  • AI microchip under cybersecurity attack, surrounded by symbols of threats like a skull, spider, lock, and warning shield

    Report Finds Agentic AI Protocol Vulnerable to Cyber Attacks

    A new report from Backslash Security has identified significant security vulnerabilities in the Model Context Protocol (MCP), technology introduced by Anthropic in November 2024 to facilitate communication between AI agents and external tools.

  • laptop displaying a red padlock icon sits on a wooden desk with a digital network interface background

    Reports Point to Domain Controllers as Prime Ransomware Targets

    A recent report from Microsoft reinforces warns of the critical role Active Directory (AD) domain controllers play in large-scale ransomware attacks, aligning with U.S. government advisories on the persistent threat of AD compromise.

  • educators seated at a table with a laptop and tablet, against a backdrop of muted geometric shapes

    HMH Forms Educator Council to Inform AI Tool Development

    Adaptive learning company HMH has established an AI Educator Council that brings together teachers, instructional coaches and leaders from school district across the country to help shape its AI solutions.