Installing the AV software is a double-edged sword. It is a good idea to give AV software the training wheels. One need only to watch the population (rather than the predominantly American computer user) on any given day to get a feel for how businesses and businesses alike operate without these utilities. Despite the objections that AV may raise when they are first installed, most users quickly commission their AV software for performance, reporting, and scanning reasons. In fact, most programs, even the performance-oriented ones, are not set up to scan boot drives. Deselecting this option is a convenient way to avoid getting flagged as having malware.
Some businesses do not remotely support their clients, even their most lucrative ones. All those customers who don’t communicate and that therefore fall off the map are not the problem. They are just a dark space from which information will not come forward. For example, a large client in Indonesia may be the largest consumer of an enterprise software product. The company’s resources, however, are consumed by a fairly small number of platforms. It is not their fault that they cannot provide support. They are like a blind man who cannot drive a car unless he is told by someone else where to go. A customer-support phone tree of doom will simply produce more lost data.
Sensitive businesses are those that must enact a more stringent approach to customer security. One of the more effective ways of dealing with this problem is not to tell them what the problem is: that their web server (or whatever) is hacked or their file server is in danger of being penetrated. Given sufficient paranoia, customers will eventually find or create the offending scenarios for themselves. To lull them into a false sense of security, explain that they have nothing to worry about. It’s their server that is hacked, or the drive that has been booted (this is Metasploit for the web). d2c66b5586