In accordance with recent Symantec 2016 Internet Security Threat Report (ISTR) Theft 21, the number of publicly disclosed business data breaches has increased significantly over the last few years.
Modern organizations and businesses that know their opponents, while at the same time aware of their own strengths and vulnerabilities, can better stand in the ongoing cyber security war. However, one should not wait to be challenged in order to strengthen its attitude towards security.
But what measures should an organization take to ensure its valuable data against cyber criminals?
Her experts Symantec have created a very comprehensive list of seven cyber-security checkpoints based on best practices as recorded in the recent 2016 Internet Security Threat Report (ISTR), its annual report Symantec, which provides an overview and analysis of global cyber-threat activity.
The checklist below is intended to provide a guide for security guards and help before, during, and after an attack.
- Verify that all devices that are allowed to be connected to corporate networks have adequate security measures
Use active monitoring and configuration management to maintain a valid inventory of all devices that are connected to your business network. This includes servers, workstations, laptops as well as remote devices. - Deploy Policy Policy
Όπου αυτό είναι εφικτό, περιορίστε τις μη εξουσιοδοτημένες προς χρήση συσκευές, όπως για παράδειγμα τους εξωτερικούς φορητούς σκληρούς δίσκους και άλλα παρόμοια αφαιρούμενα μέσα. Τέτοιες συσκευές μπορεί να εισάγουν κακόβουλο λογισμικό και να διευκολύνουν τις παραβιάσεις της πνευματικής ιδιοκτησίας, είτε εκούσια ή ακούσια. Εάν επιτρέπονται οι εξωτερικές συσκευές πολυμέσων, τότε θα πρέπει να γίνεται αυτόματη σάρωση για ιούς κατά την σύνδεση τους με το δίκτυο και να χρησιμοποιείται πάντα μία λύση preventionς απώλειας δεδομένων (Data Loss Prevention- DLP) that monitors and limits the copying of confidential data to unencrypted external storage devices.
- Symantec: The key is in constant updating and repair
Processes such as update, patch, and migrate from outdated and unsafe browsers, applications, and browser plug-ins should be a fixed process that should be repeated at regular intervals and with reverence. This also applies to operating systems, not only on all computers but also on mobile, ICS and devices IoT. Always make sure you have the latest virus updates and intrusion prevention definitions available by using auto-updates from manufacturers.
Most suppliers software are working diligently to provide patches facing the vulnerabilities of the software, however, one patch can only be effective if implemented correctly and timely. Where possible, automate the implementation of young people patches to maintain protection against vulnerabilities throughout the organization.
-
Enforce an effective password policy
Make sure all passwords are strong and at least 8 -10 characters with a mixture of letters and numbers. Encourage users to avoid using the same passwords for multiple sites as well as sharing passwords with others should be banned. Passwords should be changed on a regular basis, at least every 90 days.
- Securing with regular backups
Create and maintain on a regular basis backups of critical systems as well as endpoints. In the event of a data security emergency, backups should be easily accessible to minimize disruption operation of services and employee productivity.
- Limit to email attachments
Format them mail servers so as to block or move away messages containing file attachments commonly used to spread viruses, such as .vbs,.Beat,.exe,.pif, and the files.scr. Businesses should investigate archive policies PDF which may be included as e-mail attachments. You should also make sure that mail servers are adequately protected by security software and that e-mail are scanned diligently.
- Application procedures infection and incident response
- Keep contact information with the security software company you are working with so that you are ready to immediately deal with any infection or attack on your systems.
- Make sure that a backup and recovery solution is available to repair the loss in the event of a successful attack or catastrophic loss of data.
- Make use of the possibilities detections after infection by websites portal, solution endpoint security and firewalls to identify infected systems.
- Isolate infected computers to avoid the risk of further infection inside the organization and restore the systems using reliable backup media.
- If network services are infected by malicious code or other threat, disable or block access to these services until a patch
Η Symantec has a wide range of applications that can protect organizations and businesses across its entire range of IT systems.