Intelligent CISO Issue 35 | Page 69

decrypting myths
APAC are using RDP with many a direct and often inadequately protected connection to the Internet . This simply cannot continue . IT professionals must explore special IP addresses , redirecting RDP ports and complex passwords as a starting point to protect organisational data .
Don ’ t let your guard down
In the event that an organisation ’ s infrastructure has been compromised , it ’ s important that IT teams implement additional safety checks before putting systems back online . In some cases , an entire virtual machine recovery will be the best course of action . In other cases , a file-level recovery may be more logical .
The restoration process itself must be secure , run comprehensive antivirus and anti-malware scans across all systems and force users to change their passwords . In turn , users who log in on endpoint devices should be forced to update their software to ensure that there are no holes in security .
Anthony Spiteri , Senior Global Technologist at Veeam
So , while it is imperative that the IT department is across any threats to security , it is important that the wider organisation , especially those contributing on endpoint devices , have been given a ‘ Cyberthreats 101 ’ crash course and they are able to identify vulnerabilities .
RDP has been found to be the most common point of entry into a business , closely followed by phishing attacks and software updates . These days , ransomware attackers don ’ t have to go to great lengths to get their handson confidential data . In fact , it ’ s easy pickings when office workers across
With our work from home arrangements staying put for the foreseeable future , businesses will need to introduce carefully considered strategies to safeguard their endpoint devices . Cybercriminals are highly skilled , so a comprehensive data management strategy like the 3-2-1 rule is key to reinforcing a business ’ endpoint security .
Educating all areas of the business on cyberthreats can help minimise endpoint security risk and maximise prevention . But critically , it is the responsibility of both the trained IT professionals within a business and the end-users to ensure any holes in security are patched .
This is true for both the most data cautious of employees as well as those that may have presented as an opportune weakness to cybercriminals in the past . u www . intelligentciso . com
69