By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Kevin Beaver: The strongest defense you can have goes back to the human factor -- teaching people how and why not to click on pop-up ads, installation prompts and more. Unfortunately, as long as humans are involved in computing environments, we're going to have issues -- some unintentional and others not. So, make sure the right technology is in place as well. It's a never-ending cycle of vigilance.
Tony Bradley: To prevent drive-by downloads and other spyware issues, users should avoid suspicious Web sites. Well-known sites are typically safe and malware free, but when users visit smaller sites off the beaten path, they are much more likely to pick up unwanted malware. For more protection, you can also run preventive spyware software such as Lavasoft's Ad-Aware Pro or the beta version of Microsoft Windows AntiSpyware. They have components that actively monitor your computer to guard against spyware installations.
One other step you can take is to use IE-SPYAD from researcher Eric Howes. The list contains almost 9,000 Web sites that have been identified as installing adware, spyware, browser hijackers or other malware. Implementing IE-SPYAD will ensure that these sites do not impact your systems.
Lawrence Abrams: The reality is that spyware, hijackers and other malware are becoming an epidemic like worms, Trojans and viruses. Most people think an antivirus program will cover the whole spectrum of malware when, in reality, they tend to focus on viruses, Trojans and worms. It is important to have a cocktail of defenses running on your computer.
Here are my eight spyware defenses
Note these are in no particular order as they are all equally important.
- Windows updates must be applied when they are released.
- A corporatewide firewall or local software-based firewall must be protecting every computer.
- Internet Explorer settings must be firmly secured.
- At least two different spyware removal programs should be installed on each computer, such as Spybot - Search & Destroy and Ad-Aware.
- Javacool Software LLC's SpywareBlaster should be installed in order to stop known malicious ActiveX controls from running on each computer.
- A good antivirus program should be installed on each computer.
- The antivirus, SpywareBlaster and spyware removal programs must be continuously updated for new malware definitions.
- Finally, and maybe the most important, create a guide on safe Internet use practices. For example, users should never click on pop-ups saying the computer is infected or they need to run spyware removal software, never open attachments from unknown sources and always read the fine print in software that is installed.
Go back to the initial user problems: Spyware infection scenarios
About the experts: Expert bios are available on the scenario page.