On-Access Scanning

6th July 2021 | Cybrary On-Access Scanning


on access scanning cybrary

On-Access Scanning refers to a security tool configured to deliver real-time scans of each file for malware as the file is downloaded, opened, or executed. Many different vendors offer on-access scanners that monitor all system activity and automatically scan files that have been downloaded from the Internet or through e-mail. In order for an anti-virus or anti-malware solution to be effective, it’s essential that malware is detected and blocked before it causes damage.

What does this mean for an SMB?

Your SMB should be using a form of On-Access Scanning on your systems to help detect malicious files being downloaded accidentally. Anti-virus and Anti-malware solutions are easy to get and install for your company, with many great free and paid options to use. Modern antivirus solutions (sometimes known as Next Generation AV) also perform some heuristical protection that operates outside of the signatures and looks at the behaviors of files operating on the computer in question.  It is best practice to combine both in the protection of your IT assets whether workstation or Server.

In addition to scanning for threats, CyberHoot recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:

Start building your robust, defense-in-depth cybersecurity plan today with CyberHoot.

Sources: 

NIST

Webopedia

Additional Reading:

Related Terms:

Anti-virus

Anti-malware

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Find out how CyberHoot can secure your business.


Schedule a demo

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more