Lesson 8.1 — Malware protection: choosing the right protection method for your organisation
This lesson introduces the Cyber Essentials malware protection control.
What You'll Be Able to Do
By the end of this lesson, you will be able to:
- explain the purpose of malware protection
- identify which devices need malware protection
- understand the three accepted malware protection routes
- choose a suitable method for different device types
- identify common gaps
- start building a malware protection baseline for Cyber Essentials evidence.
Why This Matters
It explains what malware protection is, why it matters, and how organisations can choose an appropriate protection method for each in-scope device. It gives learners a practical decision framework for anti-malware software, application allow listing and application sandboxing before the later lessons explore each method in more detail.
The Core Rule
Malware protection is about stopping malicious or untrusted code from running on in-scope devices.
Cyber Essentials allows three main approaches:
What the CE Assessor Looks For
A strong position shows:
- all in-scope device types are listed;
- each device type has a selected malware protection method;
- anti-malware is active and updated where used;
- anti-malware prevents malware, malicious code and malicious website connections where used;
- application allow listing is based on approved, signed applications where used;
- the approved application list is current where allow listing is used;
Copy This
Keep this rule visible:
Every in-scope device needs a clear malware protection method that is active, suitable and evidenced.
Quick Checklist
Before moving on, make sure you can say yes to these:
- [ ] What is the main purpose of malware protection?
- [ ] What are the three accepted malware protection routes?
- [ ] Do all three methods need to be used on every device?
- [ ] What should anti-malware software do where it is used?
- [ ] What is application allow listing?
Your Action
Do this now — it takes 10–20 minutes.
For each device type in your inventory, decide which malware protection option applies: Option A (anti-malware software) or Option B (app store and allow-listing controls). Add to Section MP.
Key Takeaway
Every in-scope device needs a clear malware protection method that is active, suitable and evidenced.
Your Workbook Activity
Complete: Malware protection method selection and coverage record
Next Lesson
In the next lesson: Anti-malware software: configuration, updates, malicious code prevention and website blocking