How does anti virus products play a role in your business and technology strategy?
Threats to computers and the programs they run are spreading faster and farther than ever before. In recent years, viruses could not travel that fast. They would only spread when a user would participate in a certain activity that allowed the virus in. Some viruses relied on floppy disk exchanges to spread. Things have changed rapidly since macro viruses came onto the scene in 1995. These viruses are able to attach to emails and infect users without their knowledge. Today, the viruses rely on unsuspecting users exchanging files with infections. And then computer worms changed the virus industry even more. The only way to sufficiently combat viruses, worms, and other computer ailments is to update anti virus packages on a regular basis.
The Melissa virus appeared in 1999 and made a huge leap forward for the speeds that viruses had in terms of infecting numerous computers. Unlike other macro viruses, which waited for users to sent infected information to other users, the Melissa virus simply hijacked email systems and spread itself in a proactive manner. The user only had to double click on an infected email attachment and the virus would steal the email addresses and send itself to everyone on the contact list. This mass emailing virus spread faster and farther than any other macro virus in the past. Corporate email systems quickly became clogged with the infection and some simply crashed with the pressure.
The Melissa virus, sadly, set a trend. By the end of 1999, most major viruses and worms that were threats to home and corporate computers were using the mass-emailing capability. There are other developments that also enable these virus threats to spread through computers fast.
The number of corporate network systems has allowed the increased number of virus threats to cause problems in the business work. The attack methods have changed and the virus creators rely on their own code to spread the virus to unsuspecting users. The threats also help one another to take down common applications and operating systems. Melissa was the first virus to use application vulnerabilities, but it has certainly not been the last.
In 2001, even more scary viruses came onto the scene, such as CodeRed, a file less worm that was ac complete departure from the previous virus world. The worm would present itself in memory and make no attempts to infect files. It would attack the servers themselves and send itself to other vulnerable servers.
Likewise, anti virus protection programs have grown in sophistication over the years. These programs have to deal with a large number of growing viruses with many different complexities. Programs can detect and prevent threats before they appear on the computer and cause problems. Without regular updating, the anti virus programs cannot aid the computer as well. Regular updates are essential to protecting a home computer, or an office network.
Your probably wondering how two words “Anti Virus” aligns to business and technology strategies, these two words should help “Intellectual Property”.
Handling the Remedy is available here and other leading retailers:
David G. Peterson is a business consultant and author of Handling the Remedy. He has extensive international experience managing projects and operations for large financial institutions. He has worked in North America, Europe, Middle East and Asia skillfully managing business and technical requirements, core systems enhancement and support, merger and acquisition integration's, business process reengineering, off-shoring and outsourcing.