{"id":1801,"date":"2005-03-14T00:00:00","date_gmt":"2005-03-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/14\/desktop-anti-spyware-doesnt-cut-it-says-survey\/"},"modified":"2021-12-30T11:40:01","modified_gmt":"2021-12-30T11:40:01","slug":"desktop-anti-spyware-doesnt-cut-it-says-survey","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/14\/desktop-anti-spyware-doesnt-cut-it-says-survey\/","title":{"rendered":"Desktop Anti-Spyware Doesn&#8217;t Cut It, Says Survey"},"content":{"rendered":"<p>Desktop defenses against spyware are ineffective, said a survey released recently, an opinion backed by a security analyst wired into the identity theft scene.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eight-four percent of those surveyed said that the spyware problem is worse, or at best the same, as it was three months ago.<\/p>\n<p>Although one would expect such results from a poll done by a vendor that sells gateway, not end-point, anti-spyware products, Gartner research director Avivah Litan seconded Blue Coat&#8217;s motion that today&#8217;s desktop defenses are not the ultimate solution for the spyware dilemma.  &#8220;The lack of effectiveness comes from the fact that many [programs] are signature based,&#8221; she said, referring to the one-one-one digital fingerprints that anti-spyware, like their anti-virus cousins, must create to detect and then delete each new instance of spyware. <\/p>\n<p>(It&#8217;s common, for instance, that one desktop anti-spyware product misses some spyware that rivals catch, and vice versa, the root of the advice by many experts to use multiple anti-spyware solutions.)<\/p>\n<p>In fact, about one out of every eight enterprise IT managers polled said that they re-image all their spyware-infected desktops as a matter of course.<\/p>\n<p>http:\/\/www.techweb.com\/wire\/security\/159402774<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1801","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1801"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1801\/revisions"}],"predecessor-version":[{"id":4288,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1801\/revisions\/4288"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}