Reading Time: 2 minutes
In a new byline in Security-Today, Comodo Director of Service Provider Technologies Michél Bechard writes about a layered approach to security and the infrastructure, and how it can help protect against advanced persistent threats.
From the article:
APTs do not look for a home run at the outset. The main objective is to gain access into low priority areas the company fails to protect adequately: the endpoint. By being patient the hackers can gradually work their way into higher value segments of the network where important data resides.
Regardless of the method, the attack will not stop until proven fruitless; the agent will most likely invade the network. Mission accomplished.
Short of cutting your internet connection entirely, there are other steps that can be taken to defend the network and recover in the event defenses are breached. Here are seven layers of a security checklist that every IT Administrator should have in place to defend against the ATP and/or recover from the attack.
One of the seven layers given in the article: defend the soft interior. Train and educate users on security protocols, have BYOD and VPN policies in place; have acceptable use policies backed by C-level execs—visibly enforce these policies and ensure user training is concurrent with the latest threats.
To read about all seven layers in a security checklist, go to the full article at https://security-today.com/Articles/2015/11/01/Persistent-Threats.aspx
If you feel your company’s IT environment is under attack from phishing, malware, spyware or cyberattacks, contact the security consultants at Comodo: https://enterprise.comodo.com/contact-us.php
Related Resources:
IT Management Software Open Source Windows
START FREE TRIAL GET YOUR INSTANT SECURITY SCORECARD FOR FREE
- SEO Powered Content & PR Distribution. Get Amplified Today.
- PlatoAiStream. Web3 Data Intelligence. Knowledge Amplified. Access Here.
- Minting the Future w Adryenn Ashley. Access Here.
- Source: https://blog.comodo.com/it-security/how-a-layered-approach-to-it-security-can-help/
- :is
- :not
- :where
- 200
- 7
- a
- About
- acceptable
- access
- accomplished
- adequately
- advanced
- against
- Agent
- All
- and
- approach
- ARE
- areas
- article
- At
- attack
- backed
- BE
- being
- Blog
- by
- CAN
- click
- company
- Company’s
- concurrent
- connection
- consultants
- cutting
- cyberattacks
- data
- Director
- do
- educate
- Endpoint
- enforce
- ensure
- entirely
- Environment
- Event
- Every
- fails
- feel
- For
- Free
- from
- full
- Gain
- get
- given
- Go
- gradually
- hackers
- Have
- help
- here
- higher
- Home
- How
- HTTPS
- important
- in
- Infrastructure
- instant
- interior
- Internet
- internet connection
- into
- Invade
- IT
- it security
- jpg
- layered
- layers
- likely
- Look
- Low
- Main
- malware
- management
- max-width
- method
- Mission
- most
- network
- New
- objective
- of
- on
- online
- online security
- open
- open source
- or
- Other
- patient
- phishing
- PHP
- Place
- plato
- Plato Data Intelligence
- PlatoData
- policies
- priority
- protect
- protection
- protocols
- proven
- provider
- Read
- Recover
- report
- Resources
- Run
- scorecard
- security
- segments
- send
- service
- Service Provider
- seven
- should
- Soft
- Software
- Source
- spyware
- Steps
- Stop
- tank
- Technologies
- that
- The
- their
- There.
- These
- think
- think tank
- threat
- Threat Report
- threats
- time
- to
- Train
- Training
- under
- until
- use
- User
- users
- value
- VPN
- Way..
- What
- What is
- will
- with
- Work
- You
- Your
- zephyrnet