NHS South Commissioning Support Unit

Similar documents
IT ANTI-VIRUS POLICY Version 2.5

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

ECDL / ICDL IT Security. Syllabus Version 2.0

SECURE USE OF IT Syllabus Version 2.0

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Online Security and Safety Protect Your Computer - and Yourself!

FAQ. Usually appear to be sent from official address

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

NMHC HIPAA Security Training Version

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Mobile Working Policy

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Manually Remove Of Xp Internet Security Protect Virus Manually

How To Remove Virus Without Antivirus In >>>CLICK HERE<<<

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

ICS Dissolvable Agent for SafeGuard

Unique Phishing Attacks (2008 vs in thousands)

Seqrite Antivirus for Server

Quick Heal Total Security

Cyber Security Practice Questions. Varying Difficulty

Security Protection

Unit 2 Assignment 2. Software Utilities?

Cyber Security Guide for NHSmail

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

3.5 SECURITY. How can you reduce the risk of getting a virus?

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

INTERNET SAFETY IS IMPORTANT

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

IT JARGON BUSTERS NETWORKING TERMS

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Dr.Web KATANA. Kills Active Threats And New Attacks

Protecting from Attack in Office 365

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

Acceptable Use Policy

INFORMATION SECURITY AND RISK POLICY

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Acceptable Use Policy

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

The best for everyday PC users

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Annexure E Technical Bid Format

Information Security BYOD Procedure

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Security Gap Analysis: Aggregrated Results

Systems and Principles Unit Syllabus

MIS5206-Section Protecting Information Assets-Exam 1

Owner of the content within this article is Written by Marc Grote

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

CHAPTER 8 SECURING INFORMATION SYSTEMS

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Sophos Central Admin. help

What is Zemana AntiLogger?

SUMMARIES OF INTERACTIVE MULTIMEDIA

Acceptable Use Policy

Sophos Central Admin. help

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

MESSAGING SECURITY GATEWAY. Solution overview

REPORTING INFORMATION SECURITY INCIDENTS

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Security Essentials

Free antivirus software download

Canadian Anti-Spam Legislation (CASL) Compliance Policy. 2. Adopt Canadian Anti-Spam Legislation (CASL) Compliance Policy.

Manual Removal Norton Internet Security Won't Open Or

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

A Review Paper on Network Security Attacks and Defences

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Security Awareness. Presented by OSU Institute of Technology

9 Steps to Protect Against Ransomware

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Information Security Management System ISO/IEC 27001:2013

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document

II.C.4. Policy: Southeastern Technical College Computer Use

State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Acceptable Use Policy

CompTIA Network+ Lab Series Network Concepts. Lab 11: Business Continuity - Disaster Recovery

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 7

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Seqrite Endpoint Security

Guidelines for Account Management and Effective Usage

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Web Cash Fraud Prevention Best Practices

IT ACCEPTABLE USE POLICY

Securing the SMB Cloud Generation

Get BitDefender Client Security 2 Years 30 PCs software suite ]

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

CIS 700/002 : Special Topics : Protection Mechanisms & Secure Design Principles

Writer Corporation. Data Protection Policy

Transcription:

NHS South Commissioning Support Unit ICT Anti-virus Policy This document can be made available in a range of languages and formats on request to the policy author. Version: Ratified by: V.2.1 Alliance Leadership Team (Senior) Date ratified: 15 th December 2014 Name of Responsible Officer/author: Name of responsible committee/individual: Stuart Collier, Information Security Manager Name of executive lead: Date issued: Catherine Dampney, Chief Information Office Review date: Target audience: V.2.1 November 2014 Page 1 of 8

Document Control Sheet Title CCG ICT Antivirus Policy All Version 2.1 Status Author Final Stuart Collier Date Created 03/01/2013 Date Last Updated 05/11/2014 History Version Date Author(s) Comments 0.1 03/01/2013 SC Draft 0.2 06/01/2013 SC Comments from A Goode 1.0 21/01/2013 SC Final 1.1 05/04/2014 SC Rebrand from HITS to South CSU 1.2 05/11/14 SC Standard Document template 2.0 19/12/2014 Updated following approval (added to corporate template) 2.1 29/12/2014 SC Addition of glossary Contact Details Main points of contact Telephone number Email address Stuart Collier 023 80383812 Stuart.collier@southcsu.nhs.uk Approval/Sign Off Name Catherine Dampney Andy Eyles David Walch Title and contact CIO Associate Director of ICT Head of ICT Operations V.2.1 November 2014 Page 2 of 8

Contents 1 Introduction... 4 1.1 The Information Security Management System (ISMS)... 4 1.2 Document Purpose... 4 2 Anti-Virus Policy... 5 2.1 Policy Overview... 5 2.2 Policy Audience... 5 2.3 Policy Detail... 5 2.4 Policy Non-Conformance... 5 3 Procedure for suspected infection... 6 4 Review of Policy... 6 4.1 Review Timetable... 6 Appendix A AntiVirus Standard Products... 7 V.2.1 November 2014 Page 3 of 8

1 Introduction ICT Anti-virus Policy This document forms part of the South CSU Information Security Management System. This document provides detailed policies that govern the operation and use of software specifically designed to protect South CSU connected systems from malicious software. 1.1 The Information Security Management System (ISMS) The objective of the ISMS is to define a coherent set of policies, standards and architectures that:- Set out the governance of IT security. Provide high level policy statements on the requirements for managing IT security. Define the roles and responsibilities for implementing the IT security policy. Identify key standards, processes and procedures to support the policy. Define security architectures that encapsulate the policy and support the delivery of secure IT services. 1.2 Document Purpose This document provides the detailed Antivirus policy statements that support the overall IT security objectives of the organization as set out in the security statement in the ISMS. V.2.1 November 2014 Page 4 of 8

2 Anti-Virus Policy 2.1 Policy Overview This document contains the Antivirus (AV) policy details including actions to be taken if noncompliance occurs. A definition of the terms virus, malware and spam are described as well as the approved AV software and configuration standards in the appendices 2.2 Policy Audience This policy applies to all employees including temporary staff, sub-contractors, contractors and third parties. 2.3 Policy Detail All workstations, laptops and servers must be running approved antivirus protection which has been configured in accordance with appendix A. All removable media must be AV scanned prior to use. Users must not accept, or run, software from non-trusted sources. Users must not undertake any activities with the intention to create and/or distribute malicious programs (e.g. viruses, worms, Trojans, e-mail bombs, etc) into South CSU networks or systems Employees wishing to use personal equipment to access South CSU systems must have suitable anti-virus software installed, maintained and configured. These users must also comply with relevant remote access policies. Users must inform the IT Service Desk immediately if a virus is detected on their system. 2.4 Policy Non-Conformance Any system or workstation found to be without adequate protection as defined by this policy will be removed from the network until adequate protection is implemented. Any user being found to be wilfully violating the anti-virus policy may be subject to one or more of the following sanctions: Removal of any equipment used from the network until adequate protection is implemented Revocation of rights to access South CSU systems Any costs incurred by the IT department to remove the virus may be passed on to the department or organisation responsible for the outbreak. Subject to disciplinary action In the event of a virus outbreak, the IT Team reserves the right to temporarily remove equipment, or disable parts of the network to safeguard other systems. V.2.1 November 2014 Page 5 of 8

3 Procedure for suspected infection If a user suspects the system may be infected, the follow actions must be taken Inform the ICT service desk immediately Switch off the machine Ensure no-one uses the machine Be prepared to inform IT of any actions taken which may have caused the infection. The IT Team will: Check the infected PC and any media Rebuild the PC if the infection is severe (e.g. Conficker, Cryptolocker) Check any servers that may have been accessed from the infected system Attempt to determine the source of the infection Ensure the incident is logged. 4 Review of Policy 4.1 Review Timetable As part of the Information Security Management System, this policy will be reviewed on a continual basis by the Information Security Manager. This policy will also be reviewed as part of the annual review of the ISMS V.2.1 November 2014 Page 6 of 8

Appendix A AntiVirus Standard Products Approved Software Products Product Protecting McAfee VirusScan Enterprise Windows Servers Windows Workstations McAfee DLP Endpoint Windows Servers Windows Workstations McAfee Endpoint Protection Windows Laptops Configuration Standards Approved AntiVirus software should be installed and configured to the following standards on all applicable desktop and server equipment: All Antivirus configuration settings will be locked down to prohibit unauthorised users from disabling the software or altering the standard configuration Antivirus software on desktops will periodically check (at least daily) for updates to the AntiVirus engine and the DAT (pattern/signature) file and will automatically apply. Antivirus software on servers and gateways will check for updates on a (minimum) daily basis. Antivirus will be automatically enabled at all times when the system is in use with the following exceptions: o When software upgrades dictate disablement o To facilitate problem diagnosis. Appendix C The following ISO27001 controls are relevant to this policy A.10.4.1 Controls against malicious code A.10.4.2 Controls against mobile code V.2.1 November 2014 Page 7 of 8

Appendix D Glossary of terms Adware Antivirus Software Browser Hijacker Dat Files Keylogger Malware Phishing Ransomware Spam Spyware Trojan Software that automatically plays, displays, or downloads advertisements to a computer, often in exchange for the right to use a program without paying for it. The advertisements seen are based on monitoring of browser habits. Most adware is safe to use, but some can serve as spyware, gathering information about you from your hard drive, the websites you visit, or even your keystrokes. Certain types of adware have the capability to capture or transmit personal information. A type of software that scans a computer's memory and disk drives for viruses. If it finds a virus, the application informs the user and may clean, delete, or quarantine any files, directories, or disks affected by the virus. The term antimalware is preferred because it covers more threats. A type of malware that alters your computer's browser settings so that you are redirected to websites that you had no intention of visiting. Most browser hijackers alter browser home pages, search pages, search results, error message pages, or other browser content with unexpected or unwanted content. Also known as a data file, these files are used to update software programs, sent to users via the Internet..DAT files contain up-to-date virus signatures and other information antivirus products use to protect your computer against virus attacks..dat files are also known as detection definition files and signatures. Software that tracks or logs the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. This is usually done with malicious intent to collect information including instant messages, email text, email addresses, passwords, credit card and account numbers, addresses, and other private data. A generic term used to describe any type of software or code specifically designed to exploit a computer or the data it contains, without consent. Malware includes viruses, Trojan horses, spyware, adware, most rootkits, and other malicious programs. A form of criminal activity using social engineering techniques through email or instant messaging. Phishers attempt to fraudulently acquire other people's personal information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication. Typically, phishing emails request that recipients click on the link in the email to verify or update contact details or credit card information. Like spam, phishing emails are sent to a large number of email addresses, with the expectation that someone will act on the information in the email and disclose their personal information. Phishing can also happen via text messaging or phone. Malicious software created by a hacker to restrict access to the computer system that it infects and demand a ransom paid to the creator of the malicious software for the restriction to be removed. Some forms of ransomware may encrypt files on the system's hard drive, while others may simply lock the system and display messages to coax the user into paying. An unwanted electronic message, most commonly unsolicited bulk email. Typically, spam is sent to multiple recipients who did not ask to receive it. Types include email spam, instant messaging spam, web search-engine spam, spam in blogs, and mobile phonemessaging spam. Spam includes legitimate advertisements, misleading advertisements, and phishing messages designed to trick recipients into giving up personal and financial information. Email messages are not considered spam if a user has signed up to receive them. Spyware spies on a user's computer. Spyware can capture information like web browsing habits, email messages, usernames and passwords, and credit card information. Just like viruses, spyware can be installed on a computer through an email attachment containing malicious software. Malicious programs disguised as legitimate software. Users are typically tricked into loading and executing it on their systems. One key factor that distinguishes a Trojan from viruses and worms is that Trojans don't replicate. V.2.1 November 2014 Page 8 of 8