Anti Virus and PCI Compliance

IT Consulting and Network Management for PCI Security Requirements.

Last year PCI DSS 1.2 was released changing the intent of the controls required for anti-virus software. In version 1.1 anti-virus software was only required for systems commonly affected by viruses and excluded UNIX based operating systems and mainframes. Version 1.2 now requires all operating system types commonly affected by malicious software be protected and removes the exclusion for UNIX and mainframes. These changes now open the requirement for protection from “malicious software” such as worms, trojans, adware, spyware or any “malicious software”.

In the past, it was though Linux servers were safe from viruses but recently hackers have been taking advantage of this false sense of security. Some researchers point out that 70% of attacks on Linux honeypots were infected with a 6 year old virus (RST-B)* and used as command and control points for botnets.

ZZ Servers now offers affordable F-Prot anti-virus software for Windows, Linux, Exchange, BSD and Solaris. Protect your servers, desktops and critical infrastructure today. Contact ZZ Servers at 800-796-3574 or email [email protected] to arrange for installation of anti-virus software today.

*RST-B is a backdoor malware runs on Linux/UNIX platforms and infects ELF files in the current and /bin directories. This Linux backdoor and virus compromises system security by allowing remote users to manipulate and access infected machines. If executed as root, it will start processes listening on two network interfaces which provide a remote root shell.

What do you think?

Leave a Reply

Related articles

IT Consulting & Advisory Services

A Guide to Understanding IT Procurement – How to Source and Manage Technology for Your Business Effectively

Discover the ins and outs of IT procurement in this comprehensive guide. Learn to strategically source and manage technology for your business effectively through identifying needs, evaluating options, negotiating contracts, and maximizing long-term value. Leverage procurement tools for streamlined workflows and gain insights into spending and vendor performance to make informed decisions at every stage of the process.

Read more
Contact us

Partner with Us for Comprehensive IT

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.

Your benefits:
What happens next?
1

We Schedule a call at your convenience 

2

We do a discovery and consulting meting 

3

We prepare a proposal 

Schedule a Free Consultation