vulnerability areas hackers scan for when choosing their next victim

9
SIX TREATS FOR CYBER TRICKSTERS Vulnerability Areas Hackers Scan for When Choosing Their Next Victim

Upload: benjamin-bruno

Post on 15-Apr-2017

930 views

Category:

Services


2 download

TRANSCRIPT

Page 1: Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

SIX TREATS FOR CYBER TRICKSTERS

Vulnerability Areas Hackers Scan for When Choosing Their Next Victim

Page 2: Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

Without proactive and panoramic security measures, your organization could be serving up a buffet of business information to cyber criminals. The value of your intellectual assets, trade secrets, or employee and customer information has malicious actors lurking in the shadows, and not just at this time of year.

TREATS FOR CYBER TRICKSTERS

Page 3: Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

Privileged insiders are responsible for the bulk of all organizational data theft. Do your employees know when it’s not ok to click, what removable devices are not allowed, and how to handle sensitive information? Do you scan for malicious insider behavior such as unusual downloads, odd hours of work, or mention of financial stress?

INSIDER THREAT POTENTIAL

Page 4: Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

Automated monitoring systems can mitigate risks, but relying on sensors alone leaves you in the dark. Software solutions should be just one part of a multi-layered approach to security, which also includes data classification, risk assessment, and creation and enforcement of policies.

DATA SECURITY TUNNEL VISION

Page 5: Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

Your BYOD policy should cover topics such as local storage of files, connectivity to the network, and remote wipe capability in case of loss. Traveling employees should understand the tools used in social engineering and intelligence gathering, including social media, public Wi-Fi, and theft of laptop or other devices.

MOBILITY MISSTEPS

Page 6: Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

Is your server rack behind a closed, locked door? Are your physical security controls well-defined and regularly-enforced? Wherever IT infrastructure and data is created and stored, physical security should be considered and strengthened by policies and procedures.

PHYSICAL SECURITY WEAKNESSES

Page 7: Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

How does your company dispose of confidential information? Do you foster a culture of security? Are policies reinforced at all levels? Human behavior, administrative approaches, and financial investments in security are all crucial factors in achieving cybersecurity strength.

INTERNAL BUSINESS OPERATIONS

Page 8: Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

How secure is the information you share with outside vendors or suppliers? What administrative, technical and physical risk mitigation practices do they use and does your contract specify them? External relationships are a reality of modern business, so third-party vulnerabilities must be analyzed.

EXTERNAL BUSINESS OPERATIONS

Page 9: Vulnerability Areas Hackers Scan For When Choosing Their Next Victim

DON’T BE THE NEXT VICTIM. LEARN MORE ABOUT STOPPING THREATS TO YOUR COMPANY.

TSC Advantage

(202) 629.1960

www.tscadvantage.com

@TSCAdvantage on Twitter

TSC Advantage on LinkedIn