{"id":1059,"date":"2019-11-06T13:49:35","date_gmt":"2019-11-06T18:49:35","guid":{"rendered":"https:\/\/ndisac.org\/dev\/dibscc\/?p=1059"},"modified":"2025-05-16T13:24:41","modified_gmt":"2025-05-16T18:24:41","slug":"anti-virus-and-malware","status":"publish","type":"post","link":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/","title":{"rendered":"Anti-virus\/Malware"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]NIST describes malware, also known as malicious code, as a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim\u2019s data, applications, or operating system. Malware is the most common external threat to most hosts, causing widespread damage and disruption and necessitating extensive recovery efforts within most organizations. <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-83r1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">(Source)<\/a><br \/>\n[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]\n\t\t\t<div class='et-tabs-container et_sliderfx_fade et_sliderauto_false et_sliderauto_speed_5000 et_slidertype_top_tabs'>\n\t\t\t\t<p>\n\t\t<ul class='et-tabs-control'>\n\t\t\t<li><a href='#'>\n\t\t\tStandards\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tImplementation \/ Use Cases\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tIndustry Best Practices\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tExample Tools \/ Policies\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tCMMC Readiness\n\t\t<\/a><\/li>\n\t\t<\/ul> <!-- .et-tabs-control -->\n\n\t\t<div class='et-tabs-content'>\n\t\t\t<div class='et-tabs-content-main-wrap'>\n\t\t\t\t<div class='et-tabs-content-wrapper'>\n\t\t\t\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat603 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/csrc.nist.gov\/projects\/cprt\/catalog#\/cprt\/framework\/version\/SP_800_53_5_1_1\/home?element=SI-03\" id=\"link-3291\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-53 Rev 5: SI-3 Malicious Code Protection<\/a>\n<p>NIST resource that defines the requirements for malicious code protection.<\/p><\/li>\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-83r1.pdf\" id=\"link-1454\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-83 Rev 1: Guide to Malware Incident Prevention and Handling for Desktops and Laptops<\/a>\n<p>This NIST Special Publication provides recommendations for improving an organization\u2019s malware incident prevention measures.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat605 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/resources-tools\/training\/ensure-your-os-antivirus-and-anti-malware-protections-are-active\" id=\"link-1451\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency &#8211; Ensure Your OS Antivirus and Anti-Malware Protections are Active<\/a>\n<p>This on demand course from CISA can assist in training users on how to ensure devices have antivirus and anti-malware protection.<\/p><\/li>\n<li><a href=\"https:\/\/dl.dod.cyber.mil\/wp-content\/uploads\/trn\/online\/disa-cac-2024\/pdf\/DISA_CAC2024_WebUse.pdf\" id=\"link-1934\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">DoD &#8211; Cyber Awareness Challenge 2024 &#8211; Malicious Code<\/a>\n<p>This DoD Security Tip provides guidance on malicious code and how to protect an organization\u2019s information systems from it.<\/p><\/li>\n<li><a href=\"https:\/\/www.ninjaone.com\/blog\/how-to-protect-against-malicious-code\/\" id=\"link-1456\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">ninjaOne &#8211; How To Protect Against Malicious Code<\/a>\n<p>This blog speaks to the different types of malicious code and how to protect against it.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat606 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/resources-tools\/resources\/stopransomware-guide\" id=\"link-9648\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency &#8211; #StopRansomware Guide<\/a>\n<p>This Ransomware Guide includes ransomware prevention best practices and a ransomware response checklist.<\/p><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/news-events\/news\/protecting-against-malicious-code\" id=\"link-1452\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency &#8211; Protecting Against Malicious Code<\/a>\n<p>This guide from CISA is designed to provides high level information about protecting against malicious code. <\/p><\/li>\n<li><a href=\"https:\/\/www.sans.org\/white-papers\/68\/\" id=\"link-1458\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">SANS Whitepaper &#8211; A Practical Guide to Enterprise Antivirus and Malware Prevention<\/a>\n<p>This SANS whitepaper discusses several common practices which, when implemented together, will greatly decrease, and perhaps almost stop malware.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat604 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.amtso.org\/\" id=\"link-3310\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Anti-Malware Testing Standards Organization (AMTSO)<\/a>\n<p>AMTSO is the Anti-Malware Testing Standards Organization, a community of over 60 security and testing companies from around the world.<\/p><\/li>\n<li><a href=\"https:\/\/storage.pardot.com\/799323\/1679437428tZj9JGAf\/Malware_Defense_Policy_Template_for_CIS_Control_10.docx\" id=\"link-1464\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Center for Internet Security &#8211; Malware Defense Policy Template<\/a>\n<p>This policy template is meant to supplement the CIS Controls v8. The policy statements included within this document can be used by all CIS Implementation Groups (IGs) but are specifically geared toward Safeguards in Implementation Group 1 (IG1).<\/p><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/antivirus-for-business\" id=\"link-1466\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Microsoft &#8211; Antivirus for Business: Why It&#8217;s Essentail<\/a>\n<p>Learn about antivirus for business, why it's essential, and how it protects your small business against cyberthreats.<\/p><\/li>\n<li><a href=\"https:\/\/www.redhat.com\/en\/blog\/3-antimalware-solutions\" id=\"link-1468\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Red Hat &#8211; 3 Anti-malware Solutions for Linux Systems<\/a>\n<p>\u00a0In this article, you'll learn how to install and run three different antimalware applications that can help you keep your system free of malicious irritants that make users call you at the least convenient times: chkrootkit, rkhunter, and ClamAV.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\tCMMC Related Controls<\/p>\n<ul>\n<li>Level 1 | <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/si-l1-b-1-xiii\/\">SI.L1-B.1.XIII \u2013 Malicious Code Protection: Provide protection from malicious code at appropriate locations within organizational information systems.<\/a><\/li>\n<li>Level 1 | <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/si-l1-b-1-xiv\/\">SI.L1-B.1.XIV \u2013 Update Malicious Code Protection: Update malicious code protection mechanisms when new releases are available.<\/a><\/li>\n<li>Level 1 | <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/si-l1-b-1-xv\/\">SI.L1-B.1.XV \u2013 System &amp; File Scanning: Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.<\/a><\/li>\n<\/ul>\n<p>CMMC Assessment Guides<\/p>\n<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat671 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL1v2.pdf\" id=\"link-9988\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 1 Self-Assessment Guide<\/a>\n<p>This document provides self-assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 1.<\/p>\n<\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL2v2.pdf\" id=\"link-9989\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 2 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2.<\/p>\n<\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL3v2.pdf\" id=\"link-14791\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 3 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 3.<\/p>\n<\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n<\/span><\/p>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div> <!-- .et-tabs-container -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":1867,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>high value controls sit amet, consectetur adipiscing elit. Nam id tincidunt sapien. Suspendisse aliquam nisl sapien, luctus sodales tellus vehicula non. Interdum et malesuada fames ac ante ipsum primis in faucibus. Etiam facilisis pellentesque sapien, vel porta nibh commodo at. Aliquam eu porta nisi, eget tincidunt quam. Nam eu nunc convallis, gravida magna rhoncus, tincidunt quam. Praesent quis gravida magna, non lacinia orci. Vivamus et scelerisque odio, in fringilla massa. Integer nec ipsum nibh. Mauris tincidunt dictum nulla, id tristique massa dictum ac. Curabitur porttitor nisl sit amet ornare aliquet. Sed sed ultrices nibh, id varius felis. Nunc cursus lobortis ex feugiat aliquam.<\/p><p>Nullam justo dui, imperdiet luctus enim euismod, consequat euismod sapien. Aenean placerat fermentum magna, id tempus libero consectetur nec. Morbi a nunc orci. Donec porta, tellus vitae bibendum pulvinar, diam sapien mattis nisi, vitae lobortis quam sem non purus. Cras tempus odio eget urna faucibus sollicitudin. Aliquam porta neque in arcu vehicula venenatis eu vitae nulla. Vivamus sed neque ligula. Maecenas auctor dui et arcu pellentesque molestie.<\/p><p>Fusce luctus diam sit amet nisl consequat, vitae aliquam metus finibus. Nulla facilisi. In nec neque sem. Ut vitae fermentum mauris, vel gravida turpis. Nunc vitae velit sit amet ipsum semper condimentum sed id metus. Phasellus vel mauris dignissim, lobortis felis ac, eleifend justo. Suspendisse consectetur erat eu ipsum euismod ultricies. Vestibulum a libero quis nibh congue sagittis eget sed ipsum. Morbi dictum mi id sem imperdiet, ac pretium lorem suscipit.<\/p>","_et_gb_content_width":"","footnotes":""},"categories":[24],"tags":[],"class_list":["post-1059","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-top-10-high-value-controls"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Anti-virus\/Malware - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anti-virus\/Malware - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-06T18:49:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T18:24:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"889\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"markcarr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markcarr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/\",\"name\":\"Anti-virus\/Malware - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg\",\"datePublished\":\"2019-11-06T18:49:35+00:00\",\"dateModified\":\"2025-05-16T18:24:41+00:00\",\"author\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\"},\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#primaryimage\",\"url\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg\",\"contentUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg\",\"width\":1000,\"height\":889},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anti-virus\/Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\",\"name\":\"markcarr\",\"url\":\"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anti-virus\/Malware - DIB SCC CyberAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/","og_locale":"en_US","og_type":"article","og_title":"Anti-virus\/Malware - DIB SCC CyberAssist","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/","og_site_name":"DIB SCC CyberAssist","article_published_time":"2019-11-06T18:49:35+00:00","article_modified_time":"2025-05-16T18:24:41+00:00","og_image":[{"width":1000,"height":889,"url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg","type":"image\/jpeg"}],"author":"markcarr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markcarr","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/","url":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/","name":"Anti-virus\/Malware - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#primaryimage"},"image":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg","datePublished":"2019-11-06T18:49:35+00:00","dateModified":"2025-05-16T18:24:41+00:00","author":{"@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0"},"breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#primaryimage","url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg","contentUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg","width":1000,"height":889},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/anti-virus-and-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"Anti-virus\/Malware"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0","name":"markcarr","url":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",1000,889,false],"landscape":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",1000,889,false],"portraits":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",1000,889,false],"thumbnail":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-150x150.jpg",150,150,true],"medium":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-300x267.jpg",300,267,true],"large":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",1000,889,false],"1536x1536":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",1000,889,false],"2048x2048":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",1000,889,false],"et-pb-post-main-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-400x250.jpg",400,250,true],"et-pb-post-main-image-fullwidth":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-1000x675.jpg",1000,675,true],"et-pb-portfolio-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-400x284.jpg",400,284,true],"et-pb-portfolio-module-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-510x382.jpg",510,382,true],"et-pb-portfolio-image-single":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",1000,889,false],"et-pb-gallery-module-image-portrait":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-400x516.jpg",400,516,true],"et-pb-post-main-image-fullwidth-large":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",1000,889,false],"et-pb-image--responsive--desktop":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",810,720,false],"et-pb-image--responsive--tablet":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-980x871.jpg",620,551,true],"et-pb-image--responsive--phone":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059-480x427.jpg",304,270,true],"gform-image-choice-sm":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",300,267,false],"gform-image-choice-md":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",400,356,false],"gform-image-choice-lg":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/25801801-1059.jpg",600,533,false]},"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":" <a href=\"https:\/\/ndisac.org\/dibscc\/category\/implementation-and-assessment\/top-10-high-value-controls\/\" rel=\"tag\">Top 10 High Value Controls<\/a>","rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1059"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=1059"}],"version-history":[{"count":17,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1059\/revisions"}],"predecessor-version":[{"id":16373,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1059\/revisions\/16373"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media\/1867"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=1059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/categories?post=1059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=1059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}