Intelligent CIO APAC Issue 09 | Page 84

FINAL WORD
Anthony Spiteri , Senior Global Technologist at Veeam
a ‘ Cyberthreats 101 ’ crash course and they are able to identify vulnerabilities .
RDP has been found to be the most common point of entry into a business , closely followed by phishing attacks and software updates .
These days , ransomware attackers don ’ t have to go to great lengths to get their hands-on confidential data . In fact , it ’ s easy pickings when office workers across APAC are using RDP with many a direct and often inadequately protected connection to the Internet . This simply cannot continue . IT professionals must explore special IP addresses , redirecting RDP ports implement additional safety checks before putting systems back online . In some cases , an entire virtual machine recovery will be the best course of action . In other cases , a file-level recovery may be more logical .
The restoration process itself must be secure , run comprehensive anti-virus and anti-malware scans across all systems and force users to change their passwords . In turn , users who log in on endpoint devices should be forced to update their software to ensure that there are no holes in security .
With our work from home arrangements staying put for the foreseeable future , businesses will need to
While many IT departments can spot a hacker from a mile away , not all areas of a business are always educated on security best practice .
and complex passwords as a starting point to protect organizational data .
Don ’ t let your guard down
In the event that an organization ’ s infrastructure has been compromised , it ’ s important that IT teams introduce carefully considered strategies to safeguard their endpoint devices . Cybercriminals are highly skilled , so a comprehensive data management strategy like the 3-2-1 rule is key to reinforcing a business ’ endpoint security .
Educating all areas of the business on cyberthreats can help minimize endpoint security risk and maximize prevention . But critically , it is the responsibility of both the trained IT professionals within a business and the end-users to ensure any holes in security are patched .
This is true for both the most data cautious of employees as well as those that may have presented as an opportune weakness to cybercriminals in the past . p
84 INTELLIGENTCIO APAC www . intelligentcio . com