{"id":580,"date":"2019-12-10T18:14:39","date_gmt":"2019-12-10T18:14:39","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=580"},"modified":"2020-11-20T18:31:38","modified_gmt":"2020-11-20T18:31:38","slug":"how-to-prevent-malware-risks-in-9-ways","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/","title":{"rendered":"How to Prevent Malware Risks in 9 Ways"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Your guide on how to avoid malware and prevent malicious software from\naffecting your business<\/h2>\n\n\n\n<p>Knowing how to prevent malware \u2014 or, at least, lessen the\nrisks of it \u2014 is imperative for every organization, business, and government\nentity. Why? Because malicious software spells out disaster. It\u2019s disastrous\nfor your organization, your customers \u2014 everyone but the cybercriminal who\u2019s\nresponsible for it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Costs and Risks Associated with Malware<\/h3>\n\n\n\n<p>In fact, malware is so, it <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.thesslstore.com\/blog\/33-alarming-cybercrime-statistics-you-should-know\/\" target=\"_blank\">cost businesses an average of $2.6 million<\/a> in 2018, according to Accenture. The estimates of <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/XZGZLRVD\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">IBM\u2019s X-Force Incident Response and Intelligence Services<\/a> (IRIS) are even more bleak. They estimate that destructive malware costs large multinational companies $239 million and destroys an average of 12,316 computer workstations and servers. <\/p>\n\n\n\n<p>These numbers are terrifying by any standards. But what makes these statistics even more horrifying is the knowledge that it\u2019s virtually <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.rsa.com\/en-us\/blog\/2019-06\/perspectives-its-not-if-its-when-a-cyber-attack-will-hit\" target=\"_blank\">impossible prevent all malware attacks and cyberattacks<\/a>. By and large, industry experts have gone from focusing on malware prevention and switched gears to <a href=\"https:\/\/www.rsa.com\/en-us\/blog\/2019-06\/perspectives-its-not-if-its-when-a-cyber-attack-will-hit\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">focusing on threat detection, incident response<\/a>, and recovery. <\/p>\n\n\n\n<p>However, that doesn\u2019t mean that knowing how to prevent\n<a class=\"wpil_keyword_link\" href=\"https:\/\/sectigostore.com\/blog\/malware-attack-different-types-of-malware-attacks\/\" title=\"malware attacks\">malware attacks<\/a> isn\u2019t important. You still need to do what you can to prevent\nmalicious software and teach your employees techniques for how to avoid\nmalware. This way, any ol\u2019 threat that comes along doesn\u2019t affect your business\n\u2014 make cybercriminals really have to work for it. <\/p>\n\n\n\n<p>So, what are some of the ways for how to avoid malware and\nprevent spyware from affecting your organization? Let\u2019s get right to it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">9 Steps for How to Prevent Malware Attacks from Affecting Your Business<\/h2>\n\n\n\n<p>There are a lot of things you can do to prevent malware\noverall. Some of these are self-evident but others might be some new concepts\nto you or best practices to keep in mind. &nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Always Use Reliable Antivirus\/Anti-Malware Software<\/h3>\n\n\n\n<p>This may seem like the most obvious step, but you\u2019ll be surprised how many small businesses somehow manage to avoid or bypass implementing proper endpoint protection. Maybe it\u2019s because <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.insureon.com\/blog\/small-business-cybersecurity-poll\" target=\"_blank\">they think that they\u2019re too small to be a target<\/a>, or because they think that their customer data wouldn\u2019t be susceptible to such issues, but that\u2019s truly a load of hooey. Unfortunately, the truth of the matter is that 61% of cyberattacks affect small businesses, according to data from <a href=\"https:\/\/usa.kaspersky.com\/blog\/security_risks_report_financial_impact\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Kaspersky Labs<\/a>. And to make matters worse, the internet security firm reports that the average cost of even a minor hack is $86,500. \u00a0<\/p>\n\n\n\n<p>As you can see, it winds up costing small businesses <em>a lot<\/em> more in the end when an inevitable cyberattack occurs and they\u2019re unprepared. While this may not hurt a major enterprise, this could have a devastating effect on your small business. This is why it\u2019s important to implement <a href=\"https:\/\/sectigostore.com\/blog\/top-25-recommendations-for-small-business-cyber-security\/\">cyber security best practices for your small business<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Use Firewalls, Web Application Firewalls, &amp; Intrusion\nDetection\/Prevention Systems<\/h3>\n\n\n\n<p>If you\u2019re a large business or enterprise, then there are\nadditional steps you should definitely consider taking to prevent malicious\nsoftware. Depending on the size and set up of your network and IT architecture,\nthese defense mechanisms can include the use of:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Firewalls.<\/strong> A traditional firewall filters\nincoming network traffic to determine which ones are safe to allow through to\nyour network and which ones aren\u2019t. <\/li><li><strong>Web Application Firewalls.<\/strong> A WAF differs\nfrom a traditional firewall in that it is designed to protect your web\napplications against a variety of cyberattacks including SQL injections. It\ndoes this by looking at and evaluating requests and input data for suspicious\ninputs that can exploit access to the database and the raw data it contains.<\/li><li><strong>Intrusion Detection Systems.<\/strong> An IDS helps\nyou mitigate attacks by identifying existing malware and detecting social\nengineering attacks. It does this largely by monitoring network activity for\nsigns of malware (for example, connecting with command and control servers). <\/li><li><strong>Intrusion Prevention Systems.<\/strong> An IPS is complementary\nto an IDS by inspecting incoming traffic. It helps you to block application\nattacks by preventing malware injections, SQL injections, and by dropping\nmalicious packets and resetting network connections to block malicious incoming\ntraffic.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Keep All of Your Hardware and Software Up to Date<\/h3>\n\n\n\n<p>Nothing is more debilitating for your cyber defense than\nusing out-of-date software and (more infrequently) hardware. It\u2019s like building\na fortress, complete with a moat filled with fresh water and alligators, but\nthen choosing to leave the drawbridge down. It renders many of your defenses\ncompletely useless. So, why bother? You might as well just hand over all your\npasswords to cybercriminals and just say \u201chave fun!\u201d <\/p>\n\n\n\n<p>(No, we aren\u2019t <em>actually<\/em> recommending or condoning the\nidea of handing over your passwords and other login credentials. Relax. But you\nat least get the gist.)&nbsp; <\/p>\n\n\n\n<p>So, what can you do to ensure that your defenses are active\nand as effective as possible? By keeping them up to date. To ensure your\nhardware and software components are up to date:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Run regular scans for updates and patches;<\/li><li>Use automatic updates from Microsoft and other\ndevelopers;<\/li><li>Implement any updates and patches as soon as\npossible when they\u2019re released; and<\/li><li>Keep your account, payment, and billing\ninformation up to date for any services to avoid any lapses in coverage. <\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. Run Regular Scans and Vulnerability Assessments <\/h3>\n\n\n\n<p>It\u2019s important to regularly run scans using your antivirus,\nanti-malware, and IDS solutions to ensure that no threats are detected. Another\ngreat way to prevent malware or mitigate those that already are on your system\nis to perform vulnerability assessments and tests on your systems.\nVulnerability assessments check the software and configurations on your network\nand systems for any vulnerabilities that cybercriminals can exploit. This\nincludes not only looking for backdoors, insecure passwords, errors, and\noutdated software, or other entry points that could be exploited or used to\ninject malware. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Implement Spam and Phishing Email Filters<\/h3>\n\n\n\n<p>Although it\u2019s hard to believe that anyone can still fall for the ol\u2019 Nigerian Prince email scan, somebody somewhere still is (otherwise, cybercriminals wouldn\u2019t bother still sending them!). But, unfortunately, email security threats have come a long way since then and are becoming increasingly convincing. They also frequently contain malicious links and attachments. In fact, <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Verizon reports<\/a> that 94% of malware is delivered via email. And email-based phishing scams such as CEO fraud and spearphishing are very real and effective threats that cost businesses millions of dollars every year. \u00a0\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Have the Right People in Place <\/h3>\n\n\n\n<p>If you\u2019re a small business owner, we understand that you\nlikely wear multiple hats. However, that doesn\u2019t mean that your IT needs to \u2014\nor should \u2014 fall on you. This is one of those areas that you should really rely\non someone else who has expertise in this area. Unfortunately, research from\nInsureon indicates that 64% of small business owners report handling cyber\nsecurity on their own. This isn\u2019t comforting, particularly knowing that small\nbusinesses are a primary target of cybercriminals. <\/p>\n\n\n\n<p>This is why it\u2019s important to hire an in-house IT security expert who can handle security-related tasks on your behalf. Or, if hiring someone full-time doesn\u2019t fit within your budget, you could always consider hiring a third-party security-as-a-service (SaaS) provider. An ounce of prevention is worth a pound of cure. And considering the rapidly growing <a href=\"https:\/\/www.thesslstore.com\/blog\/33-alarming-cybercrime-statistics-you-should-know\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">costs of cybercrime<\/a> from malware and other threats, you can either choose to pay a little now or risk paying significantly more when something goes wrong. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Establish (or Hire) an SOC to Enhance Your Cyber Security Capabilities<\/h3>\n\n\n\n<p>If you\u2019re a large organization or company, you may want to\nconsider creating a security operations center (SOC) or hiring the services of\na third-party SOC. This center is responsible for data collection and threat\nevaluation and response solutions. It often involves the use of security\nincident and event management (SIEM) solutions as well as a variety of other\ntools to identify and evaluate threats.&nbsp;&nbsp;\n<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Develop and Implement Cyber Security Policies <\/h3>\n\n\n\n<p>An important component of malware prevention is preventing\nthe spread of malware. This includes: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The use of computer use policies that require\ncertain employees to follow certain protocols; <\/li><li>Limiting user access through policies of least\nprivilege (POLPs); <\/li><li>Giving non-IT users non-administrator accounts\nto restrict access; and<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">9. Train Your Employees to Serve as \u2018Human Firewalls\u2019<\/h3>\n\n\n\n<p>Although this may bring to mind the thought of cyborgs or\nother human-computer entities from science fiction, what we\u2019re talking about\nhere is the concept of cyber awareness training. It\u2019s about teaching your\nemployees how to identify malware, malicious links, and even phishers. <\/p>\n\n\n\n<p>Employee awareness training should be offered to everyone\nwithin (and outside) your organization who has access to your network, devices,\nor other systems. This includes everyone from company executives and board\nmembers to entry-level employees, interns, and even contractors. <\/p>\n\n\n\n<p>If your employees are trained to recognize and respond to\ncyber security threats, they\u2019re less likely to fall victim to <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">phishing emails<\/a>,\nphone scams or other methods of attack. A few tips for how to avoid malware\ndownloads or installations on your network or devices include teaching your\nemployees to: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Create strong and complex passwords that are\ndifficult to guess;<\/li><li>Identify and not click on malicious links;<\/li><li>Not open or download files from unverified email\nsenders;<\/li><li>Not visit compromised or insecure websites; <\/li><li>Not download any unauthorized software;<\/li><li>Not click on pop-ups and other web ads; and<\/li><li>Not attach removable hardware or other devices\nto your computer, servers, etc.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Your guide on how to avoid malware and prevent malicious software from affecting your business Knowing how to prevent malware \u2014 or, at least, lessen the risks of it \u2014&#8230;<\/p>\n","protected":false},"author":8,"featured_media":581,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[22,23],"class_list":["post-580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-malware","tag-threats","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Prevent Malware Risks in 9 Ways - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Trying to figure out how to prevent malware from invading your system &amp; putting your organization at risk? We&#039;ve got 9 ways to help you reduce those risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Prevent Malware Risks in 9 Ways - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Trying to figure out how to prevent malware from invading your system &amp; putting your organization at risk? We&#039;ve got 9 ways to help you reduce those risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-10T18:14:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-20T18:31:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/12\/how-to-prevent-malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1102\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"How to Prevent Malware Risks in 9 Ways\",\"datePublished\":\"2019-12-10T18:14:39+00:00\",\"dateModified\":\"2020-11-20T18:31:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/\"},\"wordCount\":1575,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/how-to-prevent-malware.jpg\",\"keywords\":[\"malware\",\"threats\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/\",\"name\":\"How to Prevent Malware Risks in 9 Ways - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/how-to-prevent-malware.jpg\",\"datePublished\":\"2019-12-10T18:14:39+00:00\",\"dateModified\":\"2020-11-20T18:31:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"Trying to figure out how to prevent malware from invading your system & putting your organization at risk? We've got 9 ways to help you reduce those risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/how-to-prevent-malware.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/how-to-prevent-malware.jpg\",\"width\":1600,\"height\":1102,\"caption\":\"Graphic: An illustration of what happens if you don't know how to prevent malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-to-prevent-malware-risks-in-9-ways\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Prevent Malware Risks in 9 Ways\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Prevent Malware Risks in 9 Ways - InfoSec Insights","description":"Trying to figure out how to prevent malware from invading your system & putting your organization at risk? We've got 9 ways to help you reduce those risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/","og_locale":"en_US","og_type":"article","og_title":"How to Prevent Malware Risks in 9 Ways - InfoSec Insights","og_description":"Trying to figure out how to prevent malware from invading your system & putting your organization at risk? We've got 9 ways to help you reduce those risks.","og_url":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/","og_site_name":"InfoSec Insights","article_published_time":"2019-12-10T18:14:39+00:00","article_modified_time":"2020-11-20T18:31:38+00:00","og_image":[{"width":1600,"height":1102,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/12\/how-to-prevent-malware.jpg","type":"image\/jpeg"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"How to Prevent Malware Risks in 9 Ways","datePublished":"2019-12-10T18:14:39+00:00","dateModified":"2020-11-20T18:31:38+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/"},"wordCount":1575,"commentCount":0,"image":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/12\/how-to-prevent-malware.jpg","keywords":["malware","threats"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/","url":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/","name":"How to Prevent Malware Risks in 9 Ways - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/12\/how-to-prevent-malware.jpg","datePublished":"2019-12-10T18:14:39+00:00","dateModified":"2020-11-20T18:31:38+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"Trying to figure out how to prevent malware from invading your system & putting your organization at risk? We've got 9 ways to help you reduce those risks.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/12\/how-to-prevent-malware.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/12\/how-to-prevent-malware.jpg","width":1600,"height":1102,"caption":"Graphic: An illustration of what happens if you don't know how to prevent malware"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/how-to-prevent-malware-risks-in-9-ways\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Prevent Malware Risks in 9 Ways"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=580"}],"version-history":[{"count":3,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/580\/revisions"}],"predecessor-version":[{"id":1806,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/580\/revisions\/1806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/581"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}