ITM Tech Cybersecurity Essentials Booklet - Flipbook - Page 29
10.1 Deploy and Maintain AntiMalware Software
Devices
Protect
10.2 Configure Automatic AntiMalware Signature Updates
Devices
Detect
10.5 Enable Anti-Exploitation
Features
Devices
Protect
10.6 Centrally Manage AntiMalware Software
Devices
7
IG1
IG2
7/7
IG3
7/7
Prevent or control the installation, spread, and execution of malicious
applications, code, or scripts on enterprise assets.
Why Is This CIS Control Critical?
Protect
Malicious software (sometimes categorised
as viruses or Trojans) is an integral and
dangerous aspect of internet threats. They
can have many purposes, from capturing
credentials, stealing data, identifying other
targets within the network, and encrypting
or destroying data. Malware is everevolving and adaptive, as modern variants
leverage machine learning techniques.
10.7 Use Behavior-Based AntiMalware Software
Devices
3/7
Protect
10.4 Configure Automatic AntiMalware Scanning of
Removable Media
Devices
Safeguards Total
Protect
10.3 Disable Autorun and Autoplay
for Removable Media
Devices
10 - MalwareDefenses
Malware enters an enterprise through
vulnerabilities within the enterprise on
end-user devices, email attachments,
webpages, cloud services, mobile devices,
and removable media. Malware often
relies on insecure end-user behavior, such
as clicking links, opening attachments,
installing software or profiles, or inserting
Universal Serial Bus (USB) flash drives.
Modern malware is designed to avoid,
deceive, or disable defenses.
CONTROL 10
THE SAFEGUARDS
Detect
29
1
2
3
4
5
Asset Type Security Function
1= Asset Type
2= Security Function
3= Implentation Group 1
4= Implentation Group 2
5= Implentation Group 3
Did You Know?
Cyber attacks and threats are constantly evolving, with 350,000 new malware signatures
detected every day. We can help you implenent advanced enterprise level threat protection
and detection tools that use technologies such as A.I. and Machine Learning to help protect.