Questions? Contact Us

 

Latest News

Featured News & Events

Anti Virus and PCI Compliance

Last year PCI DSS 1.2 was released changing the intent of the controls required for anti-virus software. In version 1.1 anti-virus software was only required for systems commonly affected by viruses and excluded UNIX based operating systems and mainframes. Version 1.2 now requires all operating system types commonly affected by malicious software be protected and removes the exclusion for UNIX and mainframes. These changes now open the requirement for protection from "malicious software" such as worms, trojans, adware, spyware or any "malicious software".

In the past, it was though Linux servers were safe from viruses but recently hackers have been taking advantage of this false sense of security. Some researchers point out that 70% of attacks on Linux honeypots were infected with a 6 year old virus (RST-B)* and used as command and control points for botnets.

ZZ Servers now offers affordable F-Prot anti-virus software for Windows, Linux, Exchange, BSD and Solaris. Protect your servers, desktops and critical infrastructure today. Contact ZZ Servers at 800-796-3574 or email This email address is being protected from spambots. You need JavaScript enabled to view it. to arrange for installation of anti-virus software today.

*RST-B is a backdoor malware runs on Linux/UNIX platforms and infects ELF files in the current and /bin directories. This Linux backdoor and virus compromises system security by allowing remote users to manipulate and access infected machines. If executed as root, it will start processes listening on two network interfaces which provide a remote root shell.
SimpleScripts and Softaculous Script Installer Plu...
Zabbix & OSSEC: Open-Source compliance and securit...

Related Posts

 

Tag Cloud

security circles small business PCI DSS 3.2 Health Insurance Portability information technology anti virus shared server Internet apache intrusion detection DRP cloud compliance INFOSEC Las Vegas Web Hosting spoofing Xen Geekend exchange eCommerce Solutions email accounts Reports IT solutions HIPAA data privacy protect data credit card payment physical security cli computer security two factor authentication Credit Card Security Online Business InterWorx Health Care Cybersecurity teensy video Presentation PCI Compliance World Backup Day PCI Audit ZZ Servers Co-Founder log files Home Depot Breach cybersecurity business solitions IT Services computing in the cloud data protection Server Mangement members area Sysadmin Credit Cards cyber monitoring Hosting ZZ Servers cyber liability insurance shared secure hosting Announcement HIPAA solutions arduino David Zendzian Vulnerability education IT security password lamp bash Compliance National Cyber Security Awareness Month Shmoocon Interworx-CP cyber security DEF CON ICANN amazon ec2 Internet infrastructure Medical Records QSA HIDS assesment Internet Corporation PCI Service Provider IT services command line activesync embedded Small Business healthcare solutions business community dss businesses Positive Customer Impact Domani Names phishing follow.The HIPAA Privacy Rule backup solutions credit cards stolen social engineering IT logical security compliant hosting PCI compliance PCI Hosting search PCI Solutions IT Solutions windows 7 Charleston spf passwords CentOs Healthcare Records Linux Car Hacking HIPAA Solutions TiaraCon trends cyber protection health care providers cyber Business Solutions Continuous Monitoring blackberry caller-id spam smartphone Firetalk iphone Zendzian cell phone email dsbl eCommerce BSides black friday management cyber monday shared folders Business Planning openssl mail server Debian employee training physical Scalable Redundant Cloud Infrastructure Cybersecurity Business Solutions cloud infrastructure Medical Solutions GDPR infrastructure Alarm motivation malicious software Payment Card Industry Cloud Computing support Assigned Names change ipad security OSSEC Control Panel Hackers Ubuntu Windows Accountability Act SSL business Cybersecurity computer networks business solutions pci complliant hosting data breach hosting control panel PCI Data Security Standards credit card qsa Disaster Recovery Plan safe computing Security network permissions Information Technology vps personal information phishing attacks PCI sender policy shared hosting HIPPA multi-factor authentication vulnerability scanning Email vyatta router firewall filter security PCI HIPAA kerio VPS Servers TLS recovering data