tag:blogger.com,1999:blog-4384692836709903146.post4080901454300524457..comments2024-03-27T09:55:23.143-07:00Comments on Dispatch from the Digital Health Frontier: Combating MalwareJohn Halamkahttp://www.blogger.com/profile/04550236129132159307noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4384692836709903146.post-78771123262916956562009-04-15T08:36:00.000-07:002009-04-15T08:36:00.000-07:00I don't personally know about the specifically men...I don't personally know about the specifically mentioned trojans, although I did have a particularly nasty malware incident w/ a family members computer. I threw up my hands and called in some expert advice. Not sure what they spent on the cleanup. On a broader note - my opinion regarding malware is along the lines of white-listing - although not using those specific words. I have been a long time fan of strict controls for servers - anything that is not expressly authorized is malware. Typically this is just a program installed incorrectly or without proper authorization. File integrity monitoring systems - ala tripwire - handle this very well. <br /><br />Then again - I am perhaps more draconian than needed.Frank Breszhttps://www.blogger.com/profile/18285368558855076331noreply@blogger.comtag:blogger.com,1999:blog-4384692836709903146.post-59125229405428107792009-04-15T08:29:00.000-07:002009-04-15T08:29:00.000-07:00We use Norton Ghost and keep current images for st...We use Norton Ghost and keep current images for standard desktop configurations so that we can more easily reimage machines when malware strikes. We have noticed a rise in malware/virus infections this year of about 19% over first quarter last year.<br />This does make a more compelling argument for VDI.Ahierhttps://www.blogger.com/profile/13398190978662246852noreply@blogger.com