Ready to Start Your Career?

By: sf_dod
March 8, 2018
Is Destructive Malware Slowly Becoming a Common Trend?

By: sf_dod
March 8, 2018

- Lock down your external exposure.
- Open network ports externally only if they are required for your organization to properly function.
- Any systems that need to be publicly exposed should be placed in a DMZ.
- Ensure your systems are up-to-date on all critical system and security patches.
- Ensure your systems are protected by up-to-date and properly functioning anti-malware/virus protection.
- Ensure your users are properly trained on how to utilize their email, web and other resources safely and securely.
- Implement a robust backup solution that allows you to quickly and efficiently recover from a cyber-incident or system failure.
- Develop an incident response/recovery plan for an organized and efficient response to any cyber-incident or other business interrupting event.
- Conduct a risk assessment.
- If possible, have a third-party conduct the risk assessment.
- Identifying where your organization is most vulnerable will help prioritize your security tasks and deployment of available resources.
- Lock down user permissions.
- Lock down local administrators across your organization to only the necessary administrator accounts.
- Lock down the domain admins group to only the necessary administrator accounts.
- Create separate admin and non-admin accounts for users who need administrator-level access.
- Limit the use of removable media devices on your organization’s systems.
- Implement application control across your organization, black-listing insecure applications.