Quantcast
Channel: Guides – PCM Blog
Viewing all 42 articles
Browse latest View live

5 Steps Enhance Detection of Web Server Attacks

$
0
0
pcm_blog_DetectingServerAttacks

As it’s not a question of if, but when, a web server will be attacked, early detection and remediation is key. As such, consider these five steps to improve your security’s team ability to detect a web server attack quickly:

1. Inventory and monitor devices.
To know if your web server is being or is about to be attacked, it’s absolutely critical to have active device monitoring for every device connected to your network.

2. Maintain and analyze security logs.
Once you’re monitoring your devices, it’s important to setup expected results for each security log on file so that you can easily spot any anomalies.

3. Monitor and control user accounts.
Even with devices secured and monitored, it’s important to spot any suspicious user activity. Often, attackers will attempt to impersonate one of your existing users. To limit this, revoke access from former employees and monitor user behaviors to track any suspicious behavior, such as an employee based out of your Ohio office attempting to log in from Arizona, or a Windows user attempting to log in from a Mac.

4. Implement an incident response system.
When an anomaly is detected, it’s important to have a plan in place to investigate it. Create an incident response system that assigns different alerts to different members on your team. This way, everyone has clear responsibilities and that one low grade alert will be resolved before it escalates.

5. Conduct penetration testing.
To spot weaknesses in your security and detection system, conduct penetration testing on your server regularly. Note any vulnerabilities and put together an action plan to address them.

Join the Conversation
What’s your primary method for detecting web server attacks? Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 5 Steps Enhance Detection of Web Server Attacks appeared first on PCM News.


4 Steps to Reduce the Impact of Server Attacks

$
0
0
pcm_blog_mitigating_server_attacks

Eventually, a cyber criminal will attempt to attack your web server. To mitigate the damage they can cause, consider these 4 steps to reduce the impact of server attacks:

1. Implement a data recovery plan.
To minimize the damage of an attack, make sure you have a trustworthy data recovery plan, and that you test it regularly. systems should be backed up at least weekly, and sensitive systems and files should be backed up even more frequently. Depending on the nature of your business, this may necessitate anywhere from daily backups to backups every 15 minutes.

2. Limit user access.
As always, the less access your users have to your server, the less access attackers will have when your users become compromised. Although some users may want access, if it isn’t 100% necessary, do not grant it. If temporary access must be granted, it’s imperative to revoke it when possible. All too often, users who should have temporary access to a server still have access months later.

3. Limit network traffic.
By blocking remote access to sensitive servers or data, attackers will have a much harder time getting to the information. For maximum protection, set up a multi-layered boundary that utilizes firewalls, proxies, and DMZ perimeter networks.

4. Monitor physical data flow.
In addition to blocking network access to your server, monitor physical access to it. Consider utilizing drives that feature hardware level encryption and processors that verify security at the BIOS level. Block unauthorized transfer of data off your server onto USB drives or other unprotected physical devices. All too often, an otherwise secure server can be breached via on-site activity. If your server is not protected inside a secure data center, protecting and limiting physical access to it within your office is critical.

Reduce Your Risk
Limit the damage a server attack can cause your business. Email PCM or call us at 800-700-1000 to schedule an analysis of your information security solution.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 4 Steps to Reduce the Impact of Server Attacks appeared first on PCM News.

4 Steps to Harden Defenses Against Malware

$
0
0
blog_defenseagainstmalware_1200x500_pcm

As malware continues to threaten organizations across all industries, maintaining and improving defenses against these types of attacks is critical.  To reduce the risk of malware infiltrating your network, consider these 4 steps:

1. Inventory and monitor software.
To track when malware infects a system, it is critical to first have a proper and complete inventory of authorized software on each device and have tools in place to track the software. Tracking should monitor software type, version, and patches and should scan for any unauthorized or unnecessary installs.

2. Secure hardware configurations.
Often, malware exploits vulnerabilities in hardware configurations. To prevent this, create a secure image with validated configurations that are deployed across all new devices. Regularly validate and update these configurations, tracking any changes in a configuration management system.

3. Continually assess and remediate threats.
Security isn’t set it and forget it. Proactively identify and repair vulnerabilities as they arise. Critical issues should be fixed within 48 hours. To do this, regular scanning of all systems is key.

4. Use anti-malware software!
This point deserves the exclamation. Not all anti-virus software is equipped to spot, track, and quarantine malware alerts. To block malicious code from tampering with system settings or otherwise infecting a device, deploying, maintaining, updating, and regularly running anti-malware software is critical.

Assess Your Security
To receive an information security assessment and learn the best solutions to defend your users against malware, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 4 Steps to Harden Defenses Against Malware appeared first on PCM News.

6 Steps to Enhance Detection of Malware Attacks

$
0
0
blog_MALWARE_1200x500_pcm

Innately slithery creatures, malware often goes undetected. However, in order to adequately defend against malware attacks, it’s imperative to be able to spot them. To enhance detection of malware, consider these six steps:

1. Inventory and monitor network devices.
If it’s connected to your network, your security team needs to know what it is. Utilize active monitoring and configuration management to maintain a current inventory of network devices. This will reduce attackers’ ability to find and exploit unauthorized or unprotected systems.

2. Maintain and monitor security audit logs.
To make security audit logs work for your team and not inundate you with lengthy and redundant reports that are impossible to sort through, generate standardized logs for each hardware device. The logs should include installed software, install dates, time stamps, source addresses, destination addresses, and  other packet information. The logs should be stored on a dedicated server. Run biweekly reports to quickly identify and document any anomalies.

3. Monitor and control accounts.
Review all system accounts regularly and disable any that are not actively in use by an approved user for an approved purpose. For instance, if a group account is inactive, disable it. This will limit attackers’ ability to impersonate legitimate users or ex-employees.

4.  Assess security skills and train accordingly.
Not every member of your security team needs to be an expert on malware. However, it’s important to know where your resident experts are, and how much training the rest of your team needs to fill the gaps.

5. Implement an incident response plan.
If someone’s computer was infected with malware, what’s your protocol to remove it? Who will handle the ticket if it happens in the evening or over the weekend? Without a proper plan in place, incident response time is drastically slower, giving malware more time to spread. A good incident response plan has clearly defined roles and responsibilities for each member of the security team.

6. Test, test, test.
To improve detection, it’s important to conduct penetration testing. This will help your team discover where vulnerabilities are and where security visibility needs to be improved. For maximum effects, consider red team exercises to test vulnerabilities your team might not even think to test against.

Assess Your Security
To receive an information security assessment and learn the best solutions to defend your users against malware, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 6 Steps to Enhance Detection of Malware Attacks appeared first on PCM News.

4 Steps to Reduce the Impact of Malware

$
0
0
blog_MITIGATING-MALWARE_1200x500_pcm[2]

Malware is inevitable. The key is to isolate malware, limit its affect over your organization and users, and remediate it quickly. To reduce the impact of malware attacks, consider these 4 steps:

1. Implement a data recovery solution.
To minimize the damage malware can cause, implemented a trustworthy plan for removing all traces of the attack. Implement automatic backups for each system. Backups should include all of the information required to fully restore the system, including the OS, software, and data. All systems should be updated at least weekly, with critical systems backed up at least daily.

2. Limit and validate administrator access.
Protect and validate admin accounts on devices to prevent malware from cracking an administrative password and gaining deeper access to a machine. All administrator passwords should be robust and follow FDCC standards.

3. Scrutinize data movement.
Implement systems to track data movement within the organization. Are packets being sent to and from devices that they shouldn’t? Tracking anomalies will help your team spot and quarantine malware quickly, minimizing the damage that they can cause.

4. Add multi-layer boundary defenses.
Control the flow of traffic (and malware) through the network by implementing borders. Create a mult-layered defense by utilizing firewalls, proxies, DMZ perimeter networks, and other network tools.

Assess Your Security
To receive an information security assessment and learn the best solutions to recover from malware, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 4 Steps to Reduce the Impact of Malware appeared first on PCM News.

2 Steps to Harden Defenses Against Phishing Attempts

$
0
0
blog_phishingseason_1200x500_pcm

Although it’s nice to believe our users are all savvy enough to be impervious to phishing attacks, it simply isn’t reality. In fact, according to an EMC fraud report, phishing attacks have been increasing for the last 4 years straight. In 2013, it is estimated that  450,000 phishing attacks resulted in $5.9 billion in losses. To improve your organization’s defenses against phishing attacks, consider these two steps:

1. Monitor software
Create a comprehensive inventory of every piece of software that should be installed on network devices. Deploy tools to track the software, including type, version, and patches. use this to monitor for any unauthorized changes or additions, which could be a sign that the software or device has been compromised as part of a phishing attack.

2. Utilize anti-malware.
Often, phishing sites and tools deploy malware that can be easily spotted by anti-malware software. To protect your users, ensure that you not only have anti-virus protection, but anti-malware as well. Secure browsing is critical to protecting your users from phishing attacks.  Even mobile devices should be protected. Software should be updated and scan protected devices on a daily basis.

Assess Your Security
To receive an information security assessment and learn the best solutions to avoid a phishing attack, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 2 Steps to Harden Defenses Against Phishing Attempts appeared first on PCM News.

Fishing Out Phishing Attacks

$
0
0
blog_fishing-out-phishing_1200x500

With phishing attacks on the rise every year, it’s critical to spot an attack early to protect your organization and its users. To enhance detection of phishing attacks, consider these 3 steps:

1. Monitor network devices.
If it’s connecting to the network, it needs to be inventoried, authorized, and monitored. use active monitoring and device configuration management tools to maintain an accurate inventory of network devices. This should include everything from servers and workstations to laptops and mobile devices. Doing this will help your security team spot when an unauthorized device is attempting to access your network, which can be a tell-tale sign of a cyber criminal attempting to gain access using information gleaned from a phishing attack.

2. Assess & train your security team.
To spot phishing attempts quickly, its important to make sure your team is trained on what to look for and how to respond. Begin by testing their capabilities to spot any weaknesses.

3. Conduct red team exercises.
To truly understand where your vulnerabilities and blindspots are with respect to sniffing out phishing attacks, conduct penetration tests and red team exercises. These stimulated attackes will improve organizational readiness.

Assess Your Security
To receive an information security assessment and learn the best solutions to avoid a phishing attack, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post Fishing Out Phishing Attacks appeared first on PCM News.

2 Steps to Reduce the Impact of Phishing Attacks

$
0
0
blog_Mitigating_Phishing_Attacks_1200x500_pcm

If one of your users or systems falls victim to a phishing attack, it’s important to recover from it quickly to limit the damage it can cause your organization. To reduce the impact of phishing attacks, consider these two steps:

1. Limit and validate administrator access.
Protect and validate admin accounts on devices to prevent phishing attacks from cracking an administrative password and gaining deeper access to a machine. All administrator passwords should be robust and follow FDCC standards.

2. Add multi-layer boundary defenses.
Control the flow of traffic (and malware) through the network by implementing borders. Create a mult-layered defense by utilizing firewalls, proxies, DMZ perimeter networks, and other network tools.

Assess Your Security
To receive an information security assessment and learn the best solutions to recover from a phishing attack, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

 

The post 2 Steps to Reduce the Impact of Phishing Attacks appeared first on PCM News.


Defending Against Bots

$
0
0
blog_rubots_1200x500_pcm
Are you a human? If so, then you’ve undoubtedly filled out your fair share of CAPTCHAs, squinting to determine if the character depicted is a lowercase “l” or an uppercase “I,” or some other vague character. As much as CAPTCHA systems are annoying, they are needed.
In a world where bots continually attempt to mine access to data, learning to block them is critical. Beyond the CAPTCHA, consider these 5 steps to improve defenses against bots:
1. Track software.
Establish a list of approved software for every network device. Utilize software management tools to track software, type, version, and patches. This way, if something is installed that doesn’t belong (and could thus subsequently grant access to a bot), your team will know and you’ll be able to eliminate it.
2. Secure & monitor device configurations.
It’s one thing to establish seemingly secure configuration settings on devices to protect them from malicious bots. It’s another to implement control and tracking tools to prevent these configurations from being altered and alerting you if someone tries.
3. Stay on top of security changes.
Security isn’t a set it and forget it task. It’s an ongoing commitment. Continuously check vendor updates and run atuomated vulnerability testing to make sure all systems are still secure. If a new vulnerability is spotted, fix it within 48 hours.
4. Anti-malware software is your friend.
It should go without saying, but install, update, and maintain anti-malware protection on all devices connected to your network. Anti-virus software alone isn’t enough to spot sneaky bots.

Assess Your Security
To receive an information security assessment and learn the best solutions to defend against bots, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post Defending Against Bots appeared first on PCM News.

Detecting Bots

$
0
0
blog_detecting_bots_1200x500_pcm

Inevitably, a bot will attempt to gain access to your network. To minimize the damage it can do, it’s crucial to detect it early. To improve your ability to detect bots, consider these 3 steps:

1. Monitor devices on your network.
If it’s connected to your network, you need to know about it. Reduce the ability of attackers to use bots to find and exploit unauthorized and unprotected systems by using active monitoring and configuration management. This will help you maintain an up-to-date inventory of approved devices and their profiles. This way, if one of the devices is compromised or a bot attempts to get access, you’ll be the first to know.

2. Maintain and audit security logs.
Use detailed logs to identify and uncover any suspicious behavior that may be an indicator of a bot. To do this, generate standardized logs for each device connected to your network. The log should include software information including date, time stamp, source, and destination. This way, your security software will be able to notify you instantly of meaningful changes to any of your devices, helping you detect bot activity quickly.

3. Implement an incident response plan.
Who will look into a security audit alert at 2am? To detect attacks quickly, it’s imperative to implement an incident response plan that assigns specific duties to each member of your security team. The incident response plan should have clearly delineated roles and responsibilities for quickly discovering an attack and then effectively containing the damage, eradicating the attacker or bot, and restoring security integrity.

Assess Your Security
To receive an information security assessment and learn the best solutions to defend against bots, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post Detecting Bots appeared first on PCM News.

Mitigating Bots

$
0
0
blog_mitigating_bots_1200x500_pcm

Inevitably, a bot will attempt to take advantage of your network. To minimize the damage it can cause, consider these three steps:

1. Implement boundary defenses.
To minimize the damage a bot can cause, you must fist limit its access through multi-layer boundary defenses. This will allow you to control the flow of traffic through network borders and police content by looking for evidence of a bot. Establish multi-layered defenses by utilizing firewalls, proxies, DMZ perimeter networks, and other network-based tools. Filter inbound traffic at each layer to block bot access.

2. Create a data loss prevention plan.
If a bot does get into your network, it’s important to limit the data it can retrieve. To do this, stop unauthorized transfer of sensitive data through your network. To do this, scrutinize the movement of data across borders and monitor people, processes, and systems to find any weaknesses in your security.

3. Secure network engineering.
Prevent poor network design from enabling attackers. Use a robust and secure network engineering process to prevent security holes. Deploy a network architecture with at least three tiers: DMZ, middleware, and a private network. Allow rapid deployment of new controls to quickly deflect attacks.

Assess Your Security
To receive an information security assessment and learn the best solutions to defend against bots, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post Mitigating Bots appeared first on PCM News.

Most Hackable Holiday Gifts 2015

$
0
0
holiday_gadgets_blog_1200x500

Holiday Gadgets: A Gift to Hackers?

Protect your digital life this holiday season.

With the holiday season quickly approaching, gift-givers are rushing to purchase the latest tech gadgets. Whether you give or receive a tech gift this holiday season, it’s important to ensure its security, as it could be on Intel Security’s 2015 “Most Hackable Holiday Gifts” list.

Outsmart cybercriminals and secure your holiday gifts as soon as you purchase, receive, or give them to loved ones. See which tech gadgets are at the most risk and understand a few simple ways to protect against cyber-attacks:

{db7af111-e16f-49b0-ade6-514de5ad7abb}_Hackable_Holiday_Gifts

Intel Security’s five tips for making your hackable holiday gifts safer (CNW Group/Intel Security):

Intel Security has five tips for making your hackable holiday gifts safer. (CNW Group/Intel Security)

Join the Conversation

Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitter, join us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

 

The post Most Hackable Holiday Gifts 2015 appeared first on PCM News.

5 Steps Enhance Detection of Web Server Attacks

$
0
0

As it’s not a question of if, but when, a web server will be attacked, early detection and remediation is key. As such, consider these five steps to improve your security’s team ability to detect a web server attack quickly:

1. Inventory and monitor devices.
To know if your web server is being or is about to be attacked, it’s absolutely critical to have active device monitoring for every device connected to your network.

2. Maintain and analyze security logs.
Once you’re monitoring your devices, it’s important to setup expected results for each security log on file so that you can easily spot any anomalies.

3. Monitor and control user accounts.
Even with devices secured and monitored, it’s important to spot any suspicious user activity. Often, attackers will attempt to impersonate one of your existing users. To limit this, revoke access from former employees and monitor user behaviors to track any suspicious behavior, such as an employee based out of your Ohio office attempting to log in from Arizona, or a Windows user attempting to log in from a Mac.

4. Implement an incident response system.
When an anomaly is detected, it’s important to have a plan in place to investigate it. Create an incident response system that assigns different alerts to different members on your team. This way, everyone has clear responsibilities and that one low grade alert will be resolved before it escalates.

5. Conduct penetration testing.
To spot weaknesses in your security and detection system, conduct penetration testing on your server regularly. Note any vulnerabilities and put together an action plan to address them.

Join the Conversation
What’s your primary method for detecting web server attacks? Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 5 Steps Enhance Detection of Web Server Attacks appeared first on PCM News.

4 Steps to Reduce the Impact of Server Attacks

$
0
0

Eventually, a cyber criminal will attempt to attack your web server. To mitigate the damage they can cause, consider these 4 steps to reduce the impact of server attacks:

1. Implement a data recovery plan.
To minimize the damage of an attack, make sure you have a trustworthy data recovery plan, and that you test it regularly. systems should be backed up at least weekly, and sensitive systems and files should be backed up even more frequently. Depending on the nature of your business, this may necessitate anywhere from daily backups to backups every 15 minutes.

2. Limit user access.
As always, the less access your users have to your server, the less access attackers will have when your users become compromised. Although some users may want access, if it isn’t 100% necessary, do not grant it. If temporary access must be granted, it’s imperative to revoke it when possible. All too often, users who should have temporary access to a server still have access months later.

3. Limit network traffic.
By blocking remote access to sensitive servers or data, attackers will have a much harder time getting to the information. For maximum protection, set up a multi-layered boundary that utilizes firewalls, proxies, and DMZ perimeter networks.

4. Monitor physical data flow.
In addition to blocking network access to your server, monitor physical access to it. Consider utilizing drives that feature hardware level encryption and processors that verify security at the BIOS level. Block unauthorized transfer of data off your server onto USB drives or other unprotected physical devices. All too often, an otherwise secure server can be breached via on-site activity. If your server is not protected inside a secure data center, protecting and limiting physical access to it within your office is critical.

Reduce Your Risk
Limit the damage a server attack can cause your business. Email PCM or call us at 800-700-1000 to schedule an analysis of your information security solution.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 4 Steps to Reduce the Impact of Server Attacks appeared first on PCM News.

4 Steps to Harden Defenses Against Malware

$
0
0

As malware continues to threaten organizations across all industries, maintaining and improving defenses against these types of attacks is critical.  To reduce the risk of malware infiltrating your network, consider these 4 steps:

1. Inventory and monitor software.
To track when malware infects a system, it is critical to first have a proper and complete inventory of authorized software on each device and have tools in place to track the software. Tracking should monitor software type, version, and patches and should scan for any unauthorized or unnecessary installs.

2. Secure hardware configurations.
Often, malware exploits vulnerabilities in hardware configurations. To prevent this, create a secure image with validated configurations that are deployed across all new devices. Regularly validate and update these configurations, tracking any changes in a configuration management system.

3. Continually assess and remediate threats.
Security isn’t set it and forget it. Proactively identify and repair vulnerabilities as they arise. Critical issues should be fixed within 48 hours. To do this, regular scanning of all systems is key.

4. Use anti-malware software!
This point deserves the exclamation. Not all anti-virus software is equipped to spot, track, and quarantine malware alerts. To block malicious code from tampering with system settings or otherwise infecting a device, deploying, maintaining, updating, and regularly running anti-malware software is critical.

Assess Your Security
To receive an information security assessment and learn the best solutions to defend your users against malware, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 4 Steps to Harden Defenses Against Malware appeared first on PCM News.


6 Steps to Enhance Detection of Malware Attacks

$
0
0

Innately slithery creatures, malware often goes undetected. However, in order to adequately defend against malware attacks, it’s imperative to be able to spot them. To enhance detection of malware, consider these six steps:

1. Inventory and monitor network devices.
If it’s connected to your network, your security team needs to know what it is. Utilize active monitoring and configuration management to maintain a current inventory of network devices. This will reduce attackers’ ability to find and exploit unauthorized or unprotected systems.

2. Maintain and monitor security audit logs.
To make security audit logs work for your team and not inundate you with lengthy and redundant reports that are impossible to sort through, generate standardized logs for each hardware device. The logs should include installed software, install dates, time stamps, source addresses, destination addresses, and  other packet information. The logs should be stored on a dedicated server. Run biweekly reports to quickly identify and document any anomalies.

3. Monitor and control accounts.
Review all system accounts regularly and disable any that are not actively in use by an approved user for an approved purpose. For instance, if a group account is inactive, disable it. This will limit attackers’ ability to impersonate legitimate users or ex-employees.

4.  Assess security skills and train accordingly.
Not every member of your security team needs to be an expert on malware. However, it’s important to know where your resident experts are, and how much training the rest of your team needs to fill the gaps.

5. Implement an incident response plan.
If someone’s computer was infected with malware, what’s your protocol to remove it? Who will handle the ticket if it happens in the evening or over the weekend? Without a proper plan in place, incident response time is drastically slower, giving malware more time to spread. A good incident response plan has clearly defined roles and responsibilities for each member of the security team.

6. Test, test, test.
To improve detection, it’s important to conduct penetration testing. This will help your team discover where vulnerabilities are and where security visibility needs to be improved. For maximum effects, consider red team exercises to test vulnerabilities your team might not even think to test against.

Assess Your Security
To receive an information security assessment and learn the best solutions to defend your users against malware, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 6 Steps to Enhance Detection of Malware Attacks appeared first on PCM News.

4 Steps to Reduce the Impact of Malware

$
0
0

Malware is inevitable. The key is to isolate malware, limit its affect over your organization and users, and remediate it quickly. To reduce the impact of malware attacks, consider these 4 steps:

1. Implement a data recovery solution.
To minimize the damage malware can cause, implemented a trustworthy plan for removing all traces of the attack. Implement automatic backups for each system. Backups should include all of the information required to fully restore the system, including the OS, software, and data. All systems should be updated at least weekly, with critical systems backed up at least daily.

2. Limit and validate administrator access.
Protect and validate admin accounts on devices to prevent malware from cracking an administrative password and gaining deeper access to a machine. All administrator passwords should be robust and follow FDCC standards.

3. Scrutinize data movement.
Implement systems to track data movement within the organization. Are packets being sent to and from devices that they shouldn’t? Tracking anomalies will help your team spot and quarantine malware quickly, minimizing the damage that they can cause.

4. Add multi-layer boundary defenses.
Control the flow of traffic (and malware) through the network by implementing borders. Create a mult-layered defense by utilizing firewalls, proxies, DMZ perimeter networks, and other network tools.

Assess Your Security
To receive an information security assessment and learn the best solutions to recover from malware, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 4 Steps to Reduce the Impact of Malware appeared first on PCM News.

2 Steps to Harden Defenses Against Phishing Attempts

$
0
0

Although it’s nice to believe our users are all savvy enough to be impervious to phishing attacks, it simply isn’t reality. In fact, according to an EMC fraud report, phishing attacks have been increasing for the last 4 years straight. In 2013, it is estimated that  450,000 phishing attacks resulted in $5.9 billion in losses. To improve your organization’s defenses against phishing attacks, consider these two steps:

1. Monitor software
Create a comprehensive inventory of every piece of software that should be installed on network devices. Deploy tools to track the software, including type, version, and patches. use this to monitor for any unauthorized changes or additions, which could be a sign that the software or device has been compromised as part of a phishing attack.

2. Utilize anti-malware.
Often, phishing sites and tools deploy malware that can be easily spotted by anti-malware software. To protect your users, ensure that you not only have anti-virus protection, but anti-malware as well. Secure browsing is critical to protecting your users from phishing attacks.  Even mobile devices should be protected. Software should be updated and scan protected devices on a daily basis.

Assess Your Security
To receive an information security assessment and learn the best solutions to avoid a phishing attack, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post 2 Steps to Harden Defenses Against Phishing Attempts appeared first on PCM News.

Fishing Out Phishing Attacks

$
0
0

With phishing attacks on the rise every year, it’s critical to spot an attack early to protect your organization and its users. To enhance detection of phishing attacks, consider these 3 steps:

1. Monitor network devices.
If it’s connecting to the network, it needs to be inventoried, authorized, and monitored. use active monitoring and device configuration management tools to maintain an accurate inventory of network devices. This should include everything from servers and workstations to laptops and mobile devices. Doing this will help your security team spot when an unauthorized device is attempting to access your network, which can be a tell-tale sign of a cyber criminal attempting to gain access using information gleaned from a phishing attack.

2. Assess & train your security team.
To spot phishing attempts quickly, its important to make sure your team is trained on what to look for and how to respond. Begin by testing their capabilities to spot any weaknesses.

3. Conduct red team exercises.
To truly understand where your vulnerabilities and blindspots are with respect to sniffing out phishing attacks, conduct penetration tests and red team exercises. These stimulated attackes will improve organizational readiness.

Assess Your Security
To receive an information security assessment and learn the best solutions to avoid a phishing attack, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

The post Fishing Out Phishing Attacks appeared first on PCM News.

2 Steps to Reduce the Impact of Phishing Attacks

$
0
0

If one of your users or systems falls victim to a phishing attack, it’s important to recover from it quickly to limit the damage it can cause your organization. To reduce the impact of phishing attacks, consider these two steps:

1. Limit and validate administrator access.
Protect and validate admin accounts on devices to prevent phishing attacks from cracking an administrative password and gaining deeper access to a machine. All administrator passwords should be robust and follow FDCC standards.

2. Add multi-layer boundary defenses.
Control the flow of traffic (and malware) through the network by implementing borders. Create a mult-layered defense by utilizing firewalls, proxies, DMZ perimeter networks, and other network tools.

Assess Your Security
To receive an information security assessment and learn the best solutions to recover from a phishing attack, Email PCM or call us at 800-700-1000.

Join the Conversation
Share your thoughts and questions in the comment section below. To get the latest news from PCM, follow @PCM on Twitterjoin us on Facebook, or connect with us on LinkedIn. To get the latest news sent straight to your inbox, join our newsletter.

 

The post 2 Steps to Reduce the Impact of Phishing Attacks appeared first on PCM News.

Viewing all 42 articles
Browse latest View live




Latest Images