6 biggest cyber security risks and how you can fight back

15
6 Biggest Security Risks and How to Thwart Them

Upload: mtg-it-professionals

Post on 16-Jul-2015

235 views

Category:

Technology


3 download

TRANSCRIPT

6 Biggest Security Risks and

How to Thwart Them

With 2014 being noted as “The Year of the Breach,”

many businesses are still unprepared or not properly

protected from numerous security threats.

So what can your business do to help keep sensitive

data safe? Check out the following slideshow to learn

how to protect yourself and your business from threats.

1. Disgruntled

Employees

What’s The Solution?Step 1: Identify all privileged

accounts and credentials &

immediately terminate those that

are no longer in use or are

connected to employees that are

no longer at the company.

Step 2: Closely monitor, control,

and manage privileged

credentials to prevent

exploitation in the future.

Step 3: Implement necessary

protocols and infrastructure to

track, log, and record privileged

account activity [and create

alerts) to allow for a quick

response to malicious activity

and alleviate potential damage

as early as possible.

2. Ignorant or

Careless

Employees

Employees who are not properly

trained in security best practices and

have weak passwords, visit

unauthorized websites, and/or click on

links in suspicious emails or open email

attachments pose an enormous

security threat to their employers’

systems and data.

What’s The Solution?• Train employees to learn how to manage

passwords and avoid hacking through criminal

activity.

• Provide ongoing support to make sure

employees have the resources they need to

continue to keep your business secure.

• Make sure your employees use strong

passwords with letters, numbers, symbols,

upper and lowercase.

• Ensure employees use a separate password

for each site and change them every month or

two. Use a password management system to

facilitate this process.

• Have your IT department deploy validated

encryption

• Implement multifactor authentication such as

One Time Password (OTP), RFID, smart card,

fingerprint reader or retina scanner to ensure

the user is who they claim to be

3.

Mobile security breaches have

affected 68 % of global organizations

in the last 12 months.

What’s The Solution?

• Create a carefully spelled-out BYOD policy

• Implement mobile security solutions that

protect both corporate data and access to

corporate systems while also respecting user’s

privacy

• Look to hybrid and private clouds for mitigating

potential risks

4. Cloud Applications

The cloud - by definition - is more

insecure than storing data on

premises.

When you don't own the network,

it's open to the rest of the world,

and you don't control the layers of

the stack.

What’s The Solution?

The best is to guard at the

data level using strong

encryption, such as AES

256-bit, recognized by

experts as the crypto gold

standard and retain the

keys exclusively to prevent

any third party from

accessing the data even if

it resides on a public cloud.

5. Unpatched or Unpatchable Devices

These are network devices, such as routers, servers, printers, etc. that

employ software or firmware in their operation, yet either a patch for a

vulnerability in them was not yet created or sent, or their hardware was

not designed to be updated following the discovery of vulnerabilities

Institute a patch management program to ensure that devices, and

software, are kept up to date at all times.

What’s The Solution?

6. Third-party Service Providers

Many of the high profile and extremely expensive breaches of the past year

(think Home Depot, Target, etc.) were due to contractor’s login credentials

being stolen.

What’s The Solution?

Companies need to validate that any third party follows remote access

security best practices, such as enforcing multifactor authentication,

requiring unique credentials for each user, setting least-privilege

permissions and capturing a comprehensive audit trail of all remote

access activity

Although it is impossible to have perfect cyber security, you can

minimize the impact of a security breach and leak by

conducting a risk assessment to identify where your valuable

data resides and what controls or procedures are in place to

protect it.

How secure is your infrastructure? Sign up

for MTG’s Free Network Consultation today

to find out!

www.247TECH.com