This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Practices to Mitigate Malware Effects

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

Get your price

121 writers online

Download PDF

Malware is any kind of a malicious software that can modify the functionality of a machine. It is believed that Malware is easy to deploy remotely and difficult to track the source of malware which has tremendously increased the black market for malware providers (BITS, 2011). Before developing strategy and practice to mitigate malware effects, it is important to understand the different types of malware and their behaviors that can impact an organization.

The fight against malware should be a collective approach rather than an individual or a group’s responsibility. Within an organization, there should be a proper analysis and risk assessment done to ensure that there are no loop holes in the way in which the company is addressing the malware issues. MSDN Library (2006), has listed an excellent strategic approach which provides guidance to identify, prioritize, control and mitigate such malware attacks.

According to this, it is important to assess the risk and prioritize it based on the business, conduct decision support to evaluate the controls put in place periodically, implementing controls on a regular basis depending on the advancements in the malware industry by staying updated on the trends in this dark market and putting an effective ways to measure the implemented risk management process within a company so that the company can introspect at various levels of mitigating malware risks.

  • Keeping browser plug-ins patched by installing the patches as and when available from the vendors
  • Blocking P2P usage by enforcing a no P2P (peer to peer) policy so that the malware cant be shared via P2P networks in a company.
  • Turning off Windows Autoplay option as the external drives and USB cards can be a primary source of transferring malware into the machines.
  • Turning on enhanced security in Adobe Reader that can protect the machine from any harmful attacks via PDFs
  • Limiting the use of network mapped drives as there is a high probability of malware attacks transferring through such mapped drives. These drives can be closed unless it is an absolute requirement in the company.
  • Reviewing the mail security effectiveness is important as mails and URLs are the very common type of media for malware attacks (Musthaler, 2011).

There must be efforts to develop a mitigation strategy in the organization to reduce, if not, completely avoid malware attacks not only in a reactive approach but as well in a proactive manner to be prepared and stay protected from such malicious software attacks to an organization.

At a high-level, the ways to minimize the possible ways of attack is by

  • Ensuring all patches are installed on time
  • Limiting the number of services run on a system which in turn reduces the possibility of attacks
  • Controlling and limiting the publicly available data about the system and organization (Conklin, 2016).

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Practices To Mitigate Malware Effects. (2019, September 13). GradesFixer. Retrieved November 29, 2021, from
“Practices To Mitigate Malware Effects.” GradesFixer, 13 Sept. 2019,
Practices To Mitigate Malware Effects. [online]. Available at: <> [Accessed 29 Nov. 2021].
Practices To Mitigate Malware Effects [Internet]. GradesFixer. 2019 Sept 13 [cited 2021 Nov 29]. Available from:
copy to clipboard

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.


    Attention! This essay is not unique. You can get a 100% Plagiarism-FREE one in 30 sec

    Receive a 100% plagiarism-free essay on your email just for $4.99
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.



    Please check your inbox.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    Haven't found the right essay?

    Get an expert to write you the one you need!


    Professional writers and researchers


    Sources and citation are provided


    3 hour delivery