Symantec Advice on regular security checks

In accordance with recent Symantec 2016 Internet Security Threat Report (ISTR) Theft 21, the number of publicly disclosed business data breaches has increased significantly over the last few years.

Modern organizations and businesses that know their opponents, while at the same time aware of their own strengths and vulnerabilities, can better stand in the ongoing cyber security war. However, one should not wait to be challenged in order to strengthen its attitude towards security. 1964_Anticipating_Risk_Blog-062106_R3 Symantec

But what measures should an organization take to ensure its valuable data against cyber criminals?

Her experts Symantec have created a very comprehensive list of seven cyber-security checkpoints based on best practices as recorded in the recent 2016 Internet Security Threat Report (ISTR), its annual report Symantec, which provides an overview and analysis of global cyber-threat activity.

The checklist below is intended to provide a guide for security guards and help before, during, and after an attack.

  • Verify that all devices that are allowed to be connected to corporate networks have adequate security measures
    Χρησιμοποιήστε την ενεργή παρακολούθηση και τη διαμόρφωσης για να διατηρήσετε μία επικυρωμένη απογραφή όλων των συσκευών που είναι συνδεδεμένες με το δίκτυο της επιχείρησης σας. Αυτό περιλαμβάνει servers, stations , laptops as well as remote devices.
  • Deploy Policy Policy
     Όπου αυτό είναι εφικτό, περιορίστε τις μη εξουσιοδοτημένες προς χρήση συσκευές, όπως για παράδειγμα τους εξωτερικούς φορητούς σκληρούς δίσκους και άλλα παρόμοια αφαιρούμενα μέσα. Τέτοιες συσκευές μπορεί να εισάγουν κακόβουλο and facilitate infringements of intellectual property, whether intentionally or unintentionally. If external media devices are allowed, then they should be automatically scanned for viruses when connected to the network and a data loss prevention solution should always be used (Data loss - DLP) that monitors and limits the copying of confidential data to unencrypted external storage devices.
  • Symantec: The key is in constant updating and repair

Οι διαδικασίες όπως update, και migrate από ξεπερασμένους και ανασφαλείς browsers, εφαρμογές και browser plug-ins θα πρέπει να είναι μία πάγια διαδικασία που επιβάλλεται να επαναλαμβάνεται σε τακτικά χρονικά διαστήματα και με ευλάβεια. Αυτό ισχύει και για τα λειτουργικά συστήματα, όχι μόνο σε όλους τους υπολογιστές, αλλά και σε , ICS and devices IoT. Φροντίστε πάντα να έχετε τις τελευταίες διαθέσιμες για ιούς και ορισμούς πρόληψης εισβολών, χρησιμοποιώντας τις αυτόματες ενημερώσεις των κατασκευαστών. Symantec ccs-checklist1-808x808 Symantec

Most software vendors work diligently to provide patches facing the vulnerabilities of the software, however, one patch can only be effective if implemented correctly and timely. Where possible, automate the implementation of young people patches to maintain protection against vulnerabilities throughout the organization.

  • Enforce an effective password policy
    Make sure all passwords are strong and at least 8 -10 characters with a mixture of letters and numbers. Encourage users to avoid using the same passwords for multiple sites as well as sharing passwords with others should be banned. Passwords should be changed on a regular basis, at least every 90 days.

  •  Securing with regular backups
     Create and maintain on a regular basis backups of critical systems as well as endpoints. In the event of data security emergencies, backups should be easily accessible to minimize downtime and employee productivity.
  • Limit to email attachments
    Format them
    mail servers so as to block or remove messages containing attachments commonly used to spread viruses, such as.vbs,.Beat,.exe,.pif, and the files.scr. Businesses should investigate archive policies PDF which may be included as e-mail attachments. You should also make sure that mail servers are adequately protected by security software and that e-mail are scanned diligently.
  • Application procedures infection and incident response
  • Keep contact information with the security software company you are working with so that you are ready to immediately deal with any infection or attack on your systems.
  • Make sure that a backup and recovery solution is available to repair the loss in the event of a successful attack or catastrophic loss of data.
  • Make use of post - infection detection capabilities websites portal, solution endpoint security and firewalls to identify infected systems.
  •  Isolate infected computers to avoid the risk of further infection inside the organization and restore the systems using reliable backup media.
  • If network services are infected by malicious code or other threat, disable or block access to these services until a patch

Η Symantec has a wide range of applications that can protect organizations and businesses across its entire range of IT systems. The Best Technology Site in Greecefgns

get the best stories straight into your inbox!

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).