Antimalware software can detect infections, but fixing those problems still means wiping and rebuilding your hardware In the computing world, detecting problems is far easier than fixing them. Take antimalware software: It’s always been better at accurately finding viruses and the like than at cleaning up and repairing infected systems. That left security professionals with an ongoing conundrum for the past three decades: How can we be certain we’ve cleaned up a system once it’s been compromised? Just because it tells you it’s infection-free doesn’t mean it is. Malware can modify one bit, and because you don’t know which bit has changed, you have to do a complete recovery.The answer is you can’t trust a system once it’s been compromised unless you completely rebuild it. In today’s world of insufficient backups, that task usually gets distilled into arduous and time-consuming tasks. For example, you may have to copy off all your data that isn’t backed up, format the drive, re-install the operating system and software, then replace the data.[ Roger A. Grimes offers a guided tour of the latest threats in InfoWorld’s Shop Talk video, “Fighting today’s malware.” | Stay up to date on the latest security developments with InfoWorld’s Security Central newsletter. ]Some of my favorite security features, which protect against malicious hackers and malware, focus more on detecting than preventing or fixing problems. For example, most disk encryption software (such as Microsoft BitLocker Drive Encryption, Symantec PGP Whole Disk Encryption, or open source TrueCrypt) will alert you when the data it protects has been modified but cannot be repaired. No surprise here — encryption and integrity are two different functions. Knowing you’re exploited and knowing how to easily fix that exploit has always been a challenge. For the past decade, there’ve been a growing number of solutions trying to improve the missing piece of the puzzle. Tripwire, one of the early and best-known host-intrusion applications, can not only detect unauthorized changes, it can restore systems to their known, compliant states. The problem with Tripwire and other “snapshot” software programs: They can tell you if a measured system has undergone a change, but they have no way of knowing if the measured system itself was trustworthy in the first place. How is a software program supposed to know if a system of which it takes a snapshot is unexploited to begin with? Normally the answer has been to make sure that the system you measure is clean and trustworthy at the start, but that’s hard to ensure in a large enterprise environment.Wyatt Starnes, a Tripwire co-founder, created a new company called SignaCert that tried to address the problem. SignaCert collects the file properties of tens of millions of legitimate files, including operating system files, software programs, driver files, and so on. The product uses that information to determine if a system has only known legitimate files. There’s no need to start with a brand-new, clean system. Many other application control programs such as Bit9 Parity and Lumension Application Control have started providing the same service. Many OEMs, using hidden disk partitions or install disks, have long allowed system administrators to reset PCs to their original delivered states. Infected too badly to clean it up? Just start all over. A “renew” functionality formats the disk, which means the user can end up losing data that isn’t backed up ahead of time. Either way, the user has to re-install now missing patches and other software programs and customizations that were added since the beginning. But at least the malicious modification is gone — that’s remediation, not just detection.Even operating systems are getting into repair and remediation. Windows 8 has new refresh-and-reset functionality. Refresh will reinstall Windows, but keep your files and other important custom data. Reset will take the system back to its original state. iOS and Android users have similar options.The feature doesn’t help a user figure out what the infection was nor where it came from. Still, it’s a big improvement over reformatting and reinstalling everything, which can take more than an hour. Now, it’s 5 minutes and you’re up and running again.It’s an exciting time in the computer security world because more and more remediation options are coming in the near future. The days of detection-only protection schemes will be eventually phased out in favor push-button remediation. It’s been a long wait.This story, “After infection: New schemes to restore your systems,” was originally published at InfoWorld.com. Keep up on the latest developments in network security and read more of Roger Grimes’s Security Adviser blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe