• Link to Facebook
  • Link to LinkedIn

Tel: 020 7250 3840

4TC Services
  • Home
  • IT Support
    • About Managed IT
    • Fully Managed
    • Proactive IT Support
    • Ad-Hoc
    • Mac Remote Management
    • Installation and Relocation
  • Backup
    • Direct to Cloud Backup
    • Disaster Recovery
  • Security
    • Digital ID & the Dark Web
    • Anti-Virus
    • Mail Archiving
    • Managed Anti-Spam
  • FileMaker
  • Cloud
    • IT as a Service – IaaS
  • About Us
    • Contact
    • Cookie Policy
    • Privacy Policy
    • GDPR – Statement
  • Telecoms
    • Teams – Voice and Video calling
  • Products
  • Blog
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
remote work

The 5 controls of Cyber Essentials – Protection from viruses and malware

Malware is now the most common form of computer virus. They are software or web content that’s purpose is to cause harm. These programmes attack legitimate software, then make copies of themselves and send themselves to any computer associated with their victim.

They can cause untold amounts of damage, not only to your computer and devices but to anyone connected to the same network. If a system is infected with malware, the problems can vary, malfunctioning systems, data loss, or onward infection until it causes harm elsewhere are just some examples. Most attacks are financially motivated according to Verizon’s report, they found that 86% of the data breaches they analyzed from 2019 were for financial gain¹.

How malware works

There is a variety of different ways that malware can find its way onto your computer. The user may browse a compromised website, open a file from a removable storage media, such as a memory stick, or something as simple as opening an email that turns out to be infected.

What can you do to fight back!

  1. Antivirus software is a must, it should be used on all computers and laptops at home and in the office. It may be included for free with the more popular operating systems, however, these tools are often basic and offer a limited level of protection. For office equipment it couldn’t be any easier, click ‘enable’ and you are instantly a little safer. Smartphones and tablets can require a different approach, all contain end-user device (EUD) security guidance which is easy to find online.
  2. Only download apps for mobile phones and tablets from manufacturer-approved shops. Prevent your staff from downloading apps from unknown sources as these will not have been checked for malware. Reputable manufacturer-approved shops include Google Play or the Apple App store, both of which are checked to provide a certain level of protection from malware.
  3. If these options aren’t possible for you, there is another option that is a more technical solution. Apps and programmes can be run in a ‘sandbox’. This stops them from communicating with other parts of your device or network which means they cannot be harmed.

Cyber Essentials – The Objective

To prevent harmful code from causing damage or accessing sensitive data, the aim is to do this by restricting the execution of known malware and untrusted software.

Cyber Essentials requirements

Cyber essentials certification requires that you implement one of the three approaches listed above to protect your devices against malware.

Here at 4TC, we can help your business with all aspects of cybersecurity.

Our expertise covers a wide range of bases, from proactive maintenance and Backups to full-network anti-virus and managed anti-spam solutions.  We provide managed services, project management and advice to ensure the businesses we work with remain out-of-bounds to Cybercriminals.

We’re 4tc Managed IT Services

4TC can support you with all the services you need to run your business effectively, from email and domain hosting to fully managing your whole IT infrastructure.

Setting up a great IT infrastructure is just the first step.  Keeping it up to date, safe and performing at its peak requires consistent attention.

So we can act as either your IT department or to supplement an existing IT department. We pride ourselves in developing long term relationships that add value to your business with high quality managed support, expert strategic advice, and professional project management.

https://edition.cnn.com/2020/05/19/tech/data-breach-report-verizon/index.html¹

Search Search

Recent Posts

  • The Power of Proactive IT Support: Why Prevention Beats Cure
  • Understanding the Dark Web: How Digital ID Services Safeguard Your Company
  • How to Protect Your Business from Cyber Threats with Digital ID Monitoring
  • 10 Game-Changing Strategies to Boost Productivity and Optimise Your Business Operations
  • How to Work Smarter, Not Harder: The Ultimate Guide to Business Efficiency

Recent Comments

    Archives

    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • May 2017
    • June 2015

    Categories

    • 4TC
    • Anti-Spam
    • Blogs
    • Cyber Security
    • Data Science
    • Disaster recovery
    • IT Services
    • News
    • Services
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    4TC Services

    Email: support@4tc.co.uk

    Tel: 020 7250 3840

    London Office

    5th Floor, 167‑169 Great Portland Street
    London
    W1W 5PF

    Essex Office

    Dew Gates The Street
    High Roding
    Essex
    CM6 1NT

    Signup for IT News!



      © Copyright - 4TC Services
      • Link to Facebook
      • Link to LinkedIn
      Link to: How a remote workforce is shifting priorities Link to: How a remote workforce is shifting priorities How a remote workforce is shifting prioritiesremote workLink to: The 5 controls of Cyber Essentials – Keeping your devices and software up to date Link to: The 5 controls of Cyber Essentials – Keeping your devices and software up to date remote workThe 5 controls of Cyber Essentials – Keeping your devices and software up...
      Scroll to top Scroll to top Scroll to top