Contents

This policy was established to help prevent infection of {COMPANY-NAME} computers, networks, and technology systems from malware and other malicious code. This policy is intended to help prevent damage to user applications, data, files, and hardware.

Free IT Security Policies

Get a step ahead of your goals with our comprehensive templates.

IT Security Policy Templates

Definitions

Read the full list of common vulnerabilities.

  • Virus: A program that attaches itself to an executable file or vulnerable application and delivers a payload that ranges from annoying to extremely destructive. A file virus executes when an infected file is accessed. A macro virus infects the executable code embedded in Microsoft Office programs that allows users to generate macros.
  • Trojan Horse: Destructive programs, usually viruses or worms, which are hidden in an attractive or innocent looking piece of software, such as a game or graphics program. Victims may receive a Trojan horse program by e-mail or removable media, often from another unknowing victim, or may be urged to download a file from a website or download site.
  • Worm: A program that makes copies of itself elsewhere in a computing system. These copies may be created on the same computer or may be sent over networks to other computers. Some worms are security threats using networks to spread themselves against the wishes of the system owners and disrupting networks by overloading them. A worm is similar to a virus in that it makes copies of itself, but different in that it need not attach to particular files or sectors at all.
  • Spyware: Programs that install and gather information from a computer without permission and reports the information to the creator of the software or to one or more third parties.
  • Malware: Short for malicious software, a program or file that is designed to specifically damage or disrupt a system, such as a virus, worm, or a Trojan horse.
  • Adware: Programs that are downloaded and installed without user’s consent or bound with other software to conduct commercial advertisement propaganda through pop-ups or other ways, which often lead to system slowness or exception after installing.
  • Keyloggers: A computer program that captures the keystrokes of a computer user and stores them. Modern keyloggers can store additional information, such as images of the user’s screen. Most malicious keyloggers send this data to a third party remotely (such as via email).
  • Ransomware: A type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files, unless a ransom is paid.
  • Server: A computer program that provides services to other computer programs in the same or other computers. A computer running a server program is frequently referred to as a server, although it may also be running other client (and server) programs.
  • Security Incident: In information operations, a security incident is an assessed event of attempted entry, unauthorized entry, or an information attack on an automated information system. It includes unauthorized probing and browsing; disruption or denial of service; altered or destroyed input, processing, storage, or output of information; or changes to information system hardware, firmware, or software characteristics with or without the user’s knowledge, instruction, or intent.
  • E-mail: Abbreviation for electronic mail, which consists of messages sent over any electronic media by a communications application.

Overview

Malware threats must be managed to minimize the amount of downtime realized by {COMPANY-NAME}’s systems and prevent risk to critical systems and member data. This policy is established to:

  • Create prudent and acceptable practices regarding anti-virus management.
  • Define key terms regarding malware and anti-virus protection.
  • Educate individuals, who utilize {COMPANY-NAME} system resources, on the responsibilities associated with anti-virus protection.

Note: The terms virus and malware, as well as anti-virus and anti-malware, may be used interchangeably.

Audience

This policy applies to all computers connecting to the {COMPANY-NAME} network for communications, file sharing, etc. This includes, but is not limited to, desktop computers, laptop computers, servers, and any PC based equipment connecting to the {COMPANY-NAME} network.

Policy Detail

All computer devices connected to the {COMPANY-NAME} network and networked resources shall have anti-virus software installed and configured so that the virus definition files are current and are routinely and automatically updated. The anti-virus software must be actively running on these devices.

The virus protection software must not be disabled or bypassed without IT approval.

The settings for the virus protection software must not be altered in a manner that will reduce the effectiveness of the software.

The automatic update frequency of the virus protection software must not be altered to reduce the frequency of updates.

Each file server, attached to the {COMPANY-NAME} network, must utilize {COMPANY-NAME} IT approved virus protection software and setup to detect and clean viruses that may infect {COMPANY-NAME} resources.

Each e-mail gateway must utilize {COMPANY-NAME} IT approved e-mail virus protection software.

All files on computer devices will be scanned periodically for malware.

Every virus that is not automatically cleaned by the virus protection software constitutes a security incident and must be reported to the Service Desk.

If deemed necessary to prevent propagation to other networked devices or detrimental effects to the network or data, an infected computer device may be disconnected from the {COMPANY-NAME} network until the infection has been removed.

Users Should:

  • Avoid viruses by NEVER opening any files or macros attached to an e-mail from an unknown, suspicious, or untrustworthy source. Delete these attachments immediately then remove them from the Trash or Recycle Bin.
  • Delete spam, chain, or other junk mail without opening or forwarding the item.
  • Never download files from unknown or suspicious sources.
  • Always scan removable media from an unknown or non-{COMPANY-NAME} source (such as a CD or USB from a vendor) for viruses before using it.
  • Back up critical data on a regular basis and store the data in a safe place. Critical {COMPANY-NAME} data can be saved to network drives and are backed up on a periodic basis. Contact the {COMPANY-NAME} IT Department for details.

Because new viruses are discovered every day, users should periodically check the Anti-Virus Policy for updates. The {COMPANY-NAME} IT Department should be contacted for updated recommendations.

Article by

Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and CEO of PurpleSec.
Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and CEO of PurpleSec.

Share This Page

Our Editorial Process

Our content goes through a rigorous approval process which is reviewed by cybersecurity experts – ensuring the quality and accuracy of information published.

Categories

.

$35/mo per device

Managed XDR Built For Small Business

Subscribe to easy cybersecurity and save thousands with a cloud-native managed detection and automated response solution.

Related Templates

Acceptable Use of Information Systems

An acceptable use policy outlines the use of computer equipment. Inappropriate use exposes the company to risks including virus attacks, compromise of network systems and services, and legal issues.

This policy defines the requirement for reporting and responding to incidents related to the company’s information systems and operations

A penetration testing policy provides guidance for managing a penetration testing program and performing penetration testing activities with the goal of improving defensive IT security

The purpose of an internet usage policy is to establish the rules for the use of company Internet for access to the Internet or the Intranet.

The company must prioritize its assets and protect the most critical ones first; however, it is important to ensure patching takes place on all machines.