On-Access Scanning

6th July 2021 | Cybrary On-Access Scanning


on access scanning cybrary

On-Access Scanning refers to a security tool configured to deliver real-time scans of each file for malware as the file is downloaded, opened, or executed. Many different vendors offer on-access scanners that monitor all system activity and automatically scan files that have been downloaded from the Internet or through e-mail. In order for an anti-virus or anti-malware solution to be effective, it’s essential that malware is detected and blocked before it causes damage.

What does this mean for an SMB?

Your SMB should be using a form of On-Access Scanning on your systems to help detect malicious files being downloaded accidentally. Anti-virus and Anti-malware solutions are easy to get and install for your company, with many great free and paid options to use. Modern antivirus solutions (sometimes known as Next Generation AV) also perform some heuristical protection that operates outside of the signatures and looks at the behaviors of files operating on the computer in question.  It is best practice to combine both in the protection of your IT assets whether workstation or Server.

In addition to scanning for threats, CyberHoot recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:

Start building your robust, defense-in-depth cybersecurity plan today with CyberHoot.

Sources: 

NIST

Webopedia

Additional Reading:

Related Terms:

Anti-virus

Anti-malware

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Find out how CyberHoot can secure your business.


Schedule a demo

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more