Anti Virus and PCI Compliance

IT Consulting and Network Management for PCI Security Requirements.

Last year PCI DSS 1.2 was released changing the intent of the controls required for anti-virus software. In version 1.1 anti-virus software was only required for systems commonly affected by viruses and excluded UNIX based operating systems and mainframes. Version 1.2 now requires all operating system types commonly affected by malicious software be protected and removes the exclusion for UNIX and mainframes. These changes now open the requirement for protection from “malicious software” such as worms, trojans, adware, spyware or any “malicious software”.

In the past, it was though Linux servers were safe from viruses but recently hackers have been taking advantage of this false sense of security. Some researchers point out that 70% of attacks on Linux honeypots were infected with a 6 year old virus (RST-B)* and used as command and control points for botnets.

ZZ Servers now offers affordable F-Prot anti-virus software for Windows, Linux, Exchange, BSD and Solaris. Protect your servers, desktops and critical infrastructure today. Contact ZZ Servers at 800-796-3574 or email [email protected] to arrange for installation of anti-virus software today.

*RST-B is a backdoor malware runs on Linux/UNIX platforms and infects ELF files in the current and /bin directories. This Linux backdoor and virus compromises system security by allowing remote users to manipulate and access infected machines. If executed as root, it will start processes listening on two network interfaces which provide a remote root shell.

What do you think?

Leave a Reply

Related articles

Managed Web Application Firewall

Understanding Web Security with a Managed Web Application Firewall

A managed web application firewall is essential for protecting websites from hacker attacks. Managed firewalls, run by security experts, constantly update to safeguard against new threats, offering benefits such as 24/7 monitoring, immediate threat detection, and free automatic updates. Cloud-based firewalls act as a security checkpoint, while installed firewalls provide customized protection. Various common web attacks are defended, and combining two types of firewalls ensures robust security. Factors to consider in choosing a firewall include traffic volume, application mix, budgets, compliance needs, and growth goals. Implementing strong passwords, backups, software updates, user management, and incident investigation enhances overall website security. Partnering with experienced providers ensures comprehensive protection.

Read more
Contact us

Partner with Us for Comprehensive IT

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.

Your benefits:
What happens next?
1

We Schedule a call at your convenience 

2

We do a discovery and consulting meting 

3

We prepare a proposal 

Schedule a Free Consultation