Scigazette Monthly Read February issue of Scigazette magazine | Page 26

1. Understand the targets
patches to eliminate them. You must make sure that you’ ve
There is a common misconception that only large scale
installed the latest, on all potential attack surfaces.
companies are its prey and SMEs are safe. However, results
7. Detect latent threats
show a complete different picture. SMEs are infact more vulnerable. No company or bank account is safe.
There is a huge possibility that your system contains a number of latent threats. It might be a hostile link or
2. Secure all internet threat vectors
attachment waiting to be opened. As such, all
Multiple attack vectors including user behavior, applications, and systems are exploited by the modern attacks and having a mere firewall is not enough. Email,
applications— whether locally hosted or cloudbased— must be regularly scanned and patched for vulnerabilities.
web applications, remote users, on-site users, the network
8. Prevent new attacks
perimeter, and remote access are some of the attack vendors.
Attacks are evolving and coming your way every day. To stop them, you need advanced, dynamic protection with
3. Secure all attack surfaces
sandbox analysis and access to up-to-the-minute global
With more and more businesses migrating to virtual and
threat intelligence.
cloud environments, hybrid networks are increasingly becoming the norm. Effectively securing cloud or SaaSbased applications like Office 365 requires a comprehensive solution designed to centrally manage hybrid networks.
4. Educate your users
User behavior can be your single greatest vulnerability.
Good security is a combination of enforcement, monitoring, and user education— especially against threats like phishing, spear phishing, typo-squatting and social engineering.
9. Use a good backup solution
A simple and reliable backup system is the need of the hour. When data is corrupted or stolen by malware, simply restore from backup and get started.
10. Keep management simple
As networks and threat landscapes are growing more complex, security management can become a major burden on IT staff. And this will only cause security gaps.
Minimize both risk and cost with a simple, comprehensive solution that provides“ single-pane-of-glass” security administration and visibility across your
entire infrastructure.
5. Don’ t forget your remote workforce
The mobile revolution drives productivity but it also means much of your workforce is connected via personal devices which creates a huge potential gap in your security if not properly protected.
6. Keep your systems updated
When vulnerabilities in platforms, operating systems, and applications are discovered, vendors issue updates and
Scigazette | 26 | February, 2017
As cybercriminals become more sophisticated in their use of social engineering techniques to indulge more end users into downloading malware, it’ s only a matter of time before IT organizations find themselves routinely dealing with these attacks. The real issue at hand is the poor state of data management hygiene that exists inside most IT organizations today. For this reason, it is imperative that organizations revisit their data protection strategies. Some of these tips may be more challenging to implement than others. Safe computing should be practiced— and maintaining that awareness over time— may be the most difficult, but it may also bring the greatest benefits.