Spam and Antivirus Protection

Is Your Company’s Antivirus Protection Keeping You and Your Data Safe?

With the threats of a catastrophic virus attack or ransom-ware attack rising daily, businesses must become diligent in taking the steps necessary to maximize their antivirus protection measures. The best antivirus protection minimizes threats from a virus attack, ransom-ware attack, or security breach. Need Computer Help offers a suite of services to ensure your business implements industry leading technologies to keep your IT Services protected from these very real threats.

Email Spam and Virus Filter

Our Hosted Exchange system and our Office 365 implementations all include a bundled spam and virus filter. This step alone greatly minimizes the threat of a virus or ransom-ware attack.

  • We implement an active filter that ensures every single email inbound to the organization is scanned for potential spam and for potential viruses.
  • The businesses MX record is redirected to send inbound email through this filter before it then processes to the Exchange system or Office 365 environment.
  • Staff all receive a daily digest report of email found to be potential spam. The email has quick links to release, preview, or delete emails listed in the digest.
  • Trusted domains and email addresses such as vendors and customers can be easily whitelisted to ensure no email from these sources is blocked as spam.

Antivirus Client Software

Antivirus client software is installed on each workstation, laptop, and server within our implementations. This standardizes all machines on an enterprise level antivirus platform.

  • All workstations, laptops, and servers have the latest version of the antivirus software automatically installed.
  • As antivirus patches are released, local software automatically updates to the latest version. This assures we have protection at all times to the latest threats as they are released.
  • With a paid subscription, you are assured to have active scanning and active updates for desktops, laptops, and servers within your environment.
  • Encryption prevention software is also included with our antivirus subscription. This software takes an additional step to mitigate ransom-ware attacks that are often undetected by traditional antivirus software.

Firewall Intrusion Software

Firewalls are actively managed by Need Computer Help with advanced gateway security software. This adds an additional layer of security to avoid an unwanted virus attack.

  • Firewalls are configured with deep packet inspection for imbedded viruses, spyware, worms, Trojans, malware, and ransomware to avoid attacks.
  • Firewalls are actively managed to sense and avoid attacks from known IP address ranges or geographic regions globally.
  • Continual updates are actively pushed to firewalls to ensure the latest patching for managing new vulnerabilities from virus and ransomware attacks.
  • Firewall ports and external access points are carefully monitored to ensure no path is left open for a virus or ransomware attack to breach the firewall.

Phishing Training

Even with the best antivirus, spam filtering, and intrusion software, the root of many security breaches is best achieved through user training. With our phishing training system, staff members are trained and monitored to ensure consistent workplace awareness on what is appropriate to click.

  • Upon subscribing to our phishing training, we initiate a false phishing email to all users. This email will show shipping info on a package or a local coupon. We benchmark how many users click on this email as a starting point.
  • After the initial false phishing email, all staff are required to attend an online training class on avoiding a phishing attack. The class is less than an hour in duration and requires testing and produces a grade for each staff member.
  • Upon completion of the training, we schedule periodic false phishing attacks likely on a monthly basis. These attacks are benchmarked and results are provided to your company with percentages and repeat offenders.
  • After a period of time, staff become much more aware of the dangers of phishing attacks and the likelihood of an attack through a phishing email diminishes to almost zero percent.

Backup Strategy

After all of the above are implemented, nothing protects a business better than a solid backup plan. With a solid backup plan, even the worst attack is a matter of restoring data and restoring systems. While downtime will be involved, a solid backup ensures there is minimal data loss to your business.

  • Servers are setup on image based backups. This enables us to restore the data, operating system, user configurations, and all network software in one concise step.
  • Local data is either migrated to the server or included in the backup plan. This ensures even with the loss of a local desktop or local laptop that we have a backup of any local data.
  • Mobile laptops are setup with agent based backup software to ensure regular backups regardless of location.
  • All backup data is stored onsite and offsite in a secure environment. This ensures an efficient recovery regardless of a local failure or a disaster recovery scenario.

Email Spam and Virus Filter

Our Hosted Exchange system and our Office 365 implementations all include a bundled spam and virus filter. This step alone greatly minimizes the threat of a virus or ransom-ware attack.

  • We implement an active filter that ensures every single email inbound to the organization is scanned for potential spam and for potential viruses.
  • The businesses MX record is redirected to send inbound email through this filter before it then processes to the Exchange system or Office 365 environment.
  • Staff all receive a daily digest report of email found to be potential spam. The email has quick links to release, preview, or delete emails listed in the digest.
  • Trusted domains and email addresses such as vendors and customers can be easily whitelisted to ensure no email from these sources is blocked as spam.

Antivirus Client Software

Antivirus client software is installed on each workstation, laptop, and server within our implementations. This standardizes all machines on an enterprise level antivirus platform.

  • All workstations, laptops, and servers have the latest version of the antivirus software automatically installed.
  • As antivirus patches are released, local software automatically updates to the latest version. This assures we have protection at all times to the latest threats as they are released.
  • With a paid subscription, you are assured to have active scanning and active updates for desktops, laptops, and servers within your environment.
  • Encryption prevention software is also included with our antivirus subscription. This software takes an additional step to mitigate ransom-ware attacks that are often undetected by traditional antivirus software.

Firewall Intrusion Software

Firewalls are actively managed by Need Computer Help with advanced gateway security software. This adds an additional layer of security to avoid an unwanted virus attack.(1)

  • Firewalls are configured with deep packet inspection for imbedded viruses, spyware, worms, Trojans, malware, and ransomware to avoid attacks.
  • Firewalls are actively managed to sense and avoid attacks from known IP address ranges or geographic regions globally.
  • Continual updates are actively pushed to firewalls to ensure the latest patching for managing new vulnerabilities from virus and ransomware attacks.
  • Firewall ports and external access points are carefully monitored to ensure no path is left open for a virus or ransomware attack to breach the firewall.

Phishing Training

Even with the best antivirus, spam filtering, and intrusion software, the root of many security breaches is best achieved through user training. With our phishing training system, staff members are trained and monitored to ensure consistent workplace awareness on what is appropriate to click.

  • Upon subscribing to our phishing training, we initiate a false phishing email to all users. This email will show shipping info on a package or a local coupon. We benchmark how many users click on this email as a starting point.
  • After the initial false phishing email, all staff are required to attend an online training class on avoiding a phishing attack. The class is less than an hour in duration and requires testing and produces a grade for each staff member.
  • Upon completion of the training, we schedule periodic false phishing attacks likely on a monthly basis. These attacks are benchmarked and results are provided to your company with percentages and repeat offenders.
  • After a period of time, staff become much more aware of the dangers of phishing attacks and the likelihood of an attack through a phishing email diminishes to almost zero percent.

Backup Strategy

After all of the above are implemented, nothing protects a business better than a solid backup plan. With a solid backup plan, even the worst attack is a matter of restoring data and restoring systems. While downtime will be involved, a solid backup ensures there is minimal data loss to your business.

  • Servers are setup on image based backups. This enables us to restore the data, operating system, user configurations, and all network software in one concise step.
  • Local data is either migrated to the server or included in the backup plan. This ensures even with the loss of a local desktop or local laptop that we have a backup of any local data.
  • Mobile laptops are setup with agent based backup software to ensure regular backups regardless of location.
  • All backup data is stored onsite and offsite in a secure environment. This ensures an efficient recovery regardless of a local failure or a disaster recovery scenario.