Best practices for businesses to secure their IT infrastructure
Posted on 20 November 2013.
‘Tis the season for reflecting on another year’s success, kicking off 2014 planning and preparing for... security attacks?

With Cyber Monday and the holidays fast approaching, businesses need to prepare for the prevalence of malware hidden in cheerful holiday greetings, shopping offers and heartfelt holiday videos that are designed to tempt employees to click.


SolarWinds outlined four best practices for businesses looking to keep a mindful watch on their IT infrastructure security as employees (and hackers) take part in the biggest online shopping day of the year.

1. Fortify firewalls – Firewalls are only as good as the rules that you’ve built. Regardless of network size, firewalls accumulate an ever-growing list of redundant rules and objects, along with conflicting rules and unused rules, all of which can cause mayhem in firewall management during the highly vulnerable holiday online shopping season. Ensure firewall rules are up to date in the case you are exposed from the outside or within.

2. Perfect patches – Organizations are prime targets for infestations when businesses assume that their most recent application version is security-proof, they are not up-to-date on their patches, or when they don’t have full account of all the applications installed by end users. Reduce malware exploitations when employees are susceptible to cleverly disguised holiday deal scams by keeping your patches up to date.

3. Monitor internal traffic – Identify where users are chasing shopping deals by continuously monitoring user workstation activity and behavior. With a proxy server, businesses can block certain sites, for example “no shopping,” detecting users who are trying to circumvent the policies in place. Bottom-line: If you allow it, monitor it. If you don’t, make sure it’s blocked.

4. Be on top of bandwidth – With an increased spike and concentration of users utilizing the Internet to browse holiday deals online, this strain will likely impact network bandwidth. Don’t lose sight of attackers who may strike while you’re focused on keeping your network up and running. Be prepared by monitoring network bandwidth and traffic. Additionally, take appropriate action by pinpointing users who are abusing privileges.





Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //