The primary purpose of AntiVirus is to detect and remove malware. Standard features found on reputable platforms include:
- Realtime scanning of systems
- Automatic updating of the platform
- Quarantine of harmful files
- Report on findings
AntiVirus can offer a whole host of extra features, often as part of free packages and occasionally at extra cost. Do your research and identify an AntiVirus that is best suited to your organisation’s needs and budget. You may find you meet many compliance standards with only one tool!
Here are some of the many features AntiVirus platforms have to offer:
Blocks you from reaching known malicious websites when browsing the internet, this includes malware infected websites and scam websites looking to steal personal information.
On insertion of removeable media, the software will scan for malware before allowing you to open the inserted media.
A firewall monitors and blocks unauthorised connections to the network.
Saves the password for your online accounts and automatically applies them each time you login. This feature encourages more complex and unique passwords for every account. Password Managers will only provide login details for the legitimate website to which you signed up, preventing copycat websites from stealing your credentials.
Provides a secure network connection that encrypts data as it travels across the network.
Checks independent files for malware. This is particularly helpful when you receive an attachment or need to download a file.
Scanning the dark web for any personal information, financial information and credentials, notifying you of its presence should anything be found. You have the option to investigate the alert and take the necessary action to prevent ongoing repercussions. Actions could include updating information, particularly credentials; securing vulnerable areas by implementing 2FA and strengthening privacy settings; and informing “need to know parties” (such as your bank).
Blocks unknown and malicious applications from trying to access your camera without your consent.
A backup facility to store data separately from your network.
Hidden deep within the device, rootkits have the ability to work in the background and may go unnoticed for a very long time. They contain a collection of malicious tools to carry out various tasks. Stealing information and passwords, remotely accessing the device, corrupting the Operating System and processes, infecting genuine computer programs, releasing other forms of malware, and more. With privileged access they can have complete control of the system.
Malware hidden in what appears to be a legitimate program, deceiving users into thinking it is genuine so that it gains access to systems. It can open backdoors into the device, allow criminals to take control, steal information, facilitate other malware and cause further damage.