Cybercriminals see micro, small and medium-size businesses as easy prey and therefore target them all the more frequently. That is why these businesses must invest in cybersecurity. While antivirus software is a step in the right direction, it cannot be their only protective measure.

Robert O-Callahan is a former engineer at Mozilla, the foundation that brought us Firefox. On 26 January, he dropped a bomb on the computing world. In a blog post, he did not mince his words: “... don't buy antivirus software, and uninstall it if you already have it (except, on Windows for Microsoft)”. According to him, antivirus programmes are not only devoid of real security benefits, but actually “hurt security significantly, by preventing users from accessing important security fixes, or worse still, by opening up attack vectors”.

Don't buy antivirus software, and uninstall it if you already have it

Robert O-Callahan, former engineer at Mozilla

This information is unlikely to reassure users, and micro, small and medium-sized businesses are no exception—they are particularly vulnerable to cyber-risks and, as a result, are rarely suitably equipped. Last December, the French Interministerial Delegation on Economic Intelligence (Délégation Interministérielle à l’Intelligence Économique) published a report on the subject entitled Référentiel de formation à la cyber-sécurité à la disposition des PME et TPE. The report notes, “With the exception of certain very specific sectors, micro, small and medium-sized businesses have an inadequate level of awareness and are not doing enough to address cyber-risk”.

 

Hacks and cyber-attacks on antivirus software surge

In recent years, cyber-attacks have progressed in frequency and sophistication. At the same time, Internet scams offering “free and extremely effectiveantivirus software are only adding to the confusion. The recent example of the Total AV antivirus software that appeared at the top of Google search results for “best antivirus programmes” is, at the very least, a case of marketing manipulation. This scam advertises the software at bargain basement prices but jacks the price up at check-out, and the programme is not necessarily more effective than the competition.

Traditional antivirus software is based on pre-identified virus signatures and HIPS (Host Intrusion Prevention Systems), which will analyse the behaviour of a given virus to protect against as yet unfamiliar viruses. However, protecting a business requires implementing additional technologies to create a strong defence system.

 

Choose the right tools to tackle business-specific IT risks

Cloud-based network-protection solutions and multi-layer collaborative-security-based systems, for example, help to significantly reinforce security. In conjunction with these solutions, the use of a new-generation firewall, too seldom used, can prove particularly useful in protecting against remote attacks and can block computer viruses and malware before they infiltrate the company's network.

Paul Fariello, Security Intelligence Technical Leader at Stormshield, also advises the use of sandboxing, “a new technique that enables the firewall to reroute attachments to a virtual space (sandbox) that is separate from the company's system, in order to scan for viruses before the user can open the attachment”.

 

Use good practice when it comes to cybersecurity

Whether or not you're a fan of antivirus software, there are crucial precautions you can take to ensure your cybersecurity:

  • educate employees and management about cyber-risks,
  • use complex passwords and change them regularly,
  • always install available updates to your operating system,
  • be vigilant when surfing the web and especially when downloading content,
  • do not open suspicious emails or emails from unknown senders,
  • be extremely careful when using public Wi-Fi networks and, whenever possible, connect via VPN (Virtual Private Network),
  • back up your files to an encrypted external drive, a dedicated back-up system or a secure cloud,
  • use encryption tools (also available for smartphones) to protect data stored on hard drives,
  • follow the guide published by ANSSI and CGPME entitled Guide des bonnes pratiques de l’informatique.

Share on

[juiz_sps buttons="facebook, twitter, linkedin, mail"]
Breach Fighter protects your company against unknown cyber-threats by combining Stormshield's best technologies. It is cloud-based and supported by Stormshield's network protection solutions to guarantee real-time protection against even the most sophisticated attacks.
Our Stormshield Network Security solutions are designed to protect businesses’ computer networks. They are based on a multi-layered collaborative-security approach: solutions that work together in real time and automatically strengthen security.
About the author
mm
Marco Genovese PreSales Engineer, Stormshield

Marco was born in Asti, a small Italian village better known for excellent wine than for IT infrastructure. After some non-profit experience aiming to bring internet access to the general public, Marco studied IT and worked with various companies in the security sector. He joined Netasq in 2008 and, a few years later, found the perfect combination of quality of life and computer infrastructure access work by moving to Paris. After an adventure as a Product Manager, he returned to his first love as a Pre-Sales Engineer.