logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
F-Secure
17th November 2017 by CyberVision 0 Comments 996 Views
17th November 2017 by CyberVision in F-Secure

The latest threat in the online landscape – PUAs (Potentially Unwanted Applications) 

 

 

PUA is a term used to describe an application that, while not malicious, is generally considered unsuitable for business networks. Free software always comes with a catch. Examples of these inconveniences include browser extensions or other software that gets installed automatically. Certain applications that can fall into the PUA category might be considered useful by some users. However most of the time these installations are neither requested nor solicited by the user. Here is some advice on how to deal with PUAs.

 

  • Detection and removal of PUAs should be configured with the anti-virus software you have chosen to protect your network with.

 

  • If you have not previously scanned your computers for PUAs and then removed them, it is very likely that you will find PUAs on your network. In some cases, a large number of these applications may be installed.

 

  • Deploying scanning in stages will allow you to more easily deal with any PUAs detected.

 

  • Only enable on-access scanning for PUAs as the final step of a phased deployment.

 

  • To complete the removal of an unwanted PUA, users may need to restart their computers.

 

  • You must familiarize yourself with your organization’s policy regarding PUAs and whether it is acceptable for some of these applications to be running on users’ computers.

 

  • If your organisation allows some PUAs to be on the network, you will need to configure your policies so that the specified PUAs are ‘authorized’. This means that they are excluded from scanning and cleanup.

 

  • If your organisation does not allow these applications, you can regularly scan and clean your network without the need to authorise any of these PUAs.

 

A PUA policy needs to be created and implemented to ensure that your network is kept clear and functioning properly. Setting up your network carefully and managing company policies correctly will allow you to customise PUA scanning and cleanups to suit the requirements of a variety of users on your network.

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cybersecurity
  • f-secure cyber security
  • PUA
  • solutions
  • threats
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo