To prevent a system from being susceptible to Drovorub's hiding and persistence, system administrators should update to Linux Kernel 3.7 or later to take full advantage of kernel signing enforcement. Also, system owners are advised to configure systems to load only modules with a valid digital signature making it more difficult for an actor to introduce a malicious kernel module into the system.