Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Malware Responses: What To Do Before, During, And After An Attack

Originally Published on Techweb



Don't let a malware attack ruin your business. A little planning and the right responses can make it a minor annoyance instead of a major catastrophe.

Editor's Note: This story is available as a free download in PDF format -- print it out and post it somewhere prominent. Download now!


Preparing For Attacks


• Always use licensed software, and keep all software on every system up to date with the latest critical patches.

• Scan all systems regularly to ensure they are virus-, Trojan-, and spyware-free. Make sure your security software protects all network entry and exit points and that it's updated with the most recent signature files.

• Back up all systems on a regular schedule (weekly is good; daily is better).

• Subscribe to security vendors' e-bulletins so you'll be aware of current vulnerabilities, patches, and exploits.

  • 1