Malware Defenses
Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.
Program Services & Resources
The following services and resources are provided by the NC K-12 Cybersecurity Program and provided to PSUs at no cost to help execute the actions defined in the NC K-12 CORE Safeguards:
Why are Malware Defenses Important?
Malicious software (malware), including viruses and Trojans, poses serious threats by stealing data, capturing credentials, spreading across networks, or destroying information. Modern malware is adaptive and may use machine learning to evade detection. It often exploits vulnerabilities and unsafe user behavior—such as clicking links or using infected USB drives—to enter systems via emails, websites, cloud services, and mobile devices. Effective malware defenses must be automated, frequently updated, and integrated with vulnerability and incident response processes. These defenses should be deployed across all potential entry points to detect, contain, and prevent the execution of malicious code.
What can you do?
Effective malware defense involves more than just using traditional endpoint protection tools—it requires centralized management for consistent updates and integration with threat intelligence. These tools should receive automated updates to stay current with indicators of compromise (IOCs). Beyond detection and blocking, enterprises must also collect and centralize logs to support alerting and incident response. As attackers increasingly use “living-off-the-land” (LotL) techniques—leveraging legitimate system tools to avoid detection—robust logging (aligned with CIS Control 8) becomes essential for tracing activity and understanding security incidents.
Specific details and procedures are outlined in the K-12 Cybersecurity CORE Safeguards.
**NC K-12 Cybersecurity Community Mailing list subscription is required to access the CORE Safeguard materials**