What Is Changing The Game In .work Security-jiuyaogan

UnCategorized .panies experiencing security breaches and data theft are regularly in the headlines. Those launching these attacks are increasingly well organized and very creative. What is changing the game in network security and how can you respond? Notes from a conversation with Philippe Courtot, CEO, Qualys: We are at a crossroads in data security. The movements from enterprise software to Software as a Service (SaaS), and from mainframes to PCs to mobile devices increase the challenges of protecting enterprise environments. Both criminal and governmental entities are implicated in data theft. They are very smart and are organized globally. There are so many attack vectors that development of a cohesive technology platform is imperative. .panies are very sensitive to the possibility of attack at any time. In social networks, knowledge of system .promise spreads rapidly, and with it, .promise of .pany reputation. There are three principal attack vectors: breach through web applications, breach through email and browsers, and breach by device. Between PCs, iPhones and Android devices, the PC is the most valuable because it is most closely linked to the corporate intranet while often being the most vulnerable because users are lax about updating their systems and applications. Attackers often target a .pany executive or high level administrative assistant to access the user’s profile and passwords. In one type of attack called spear fishing, the attacker creates emails tailored to the person targeted appearing to .e from a colleague or friend; when the target clicks on the email, a small piece of code is inserted in the .puter, which can give control to the attacker. Another way to gain control of a .puter is through physical access. An attacker can learn about a pending vacation via Facebook or twitter, providing an opportunity for home invasion. Once the attacker has access to the .puter, they can plant a control program on the system. When the user returns, the attackers can make fast, brief forays inserting additional code or taking data from the enterprise network. They may use the information themselves, or sell it to others. Given these new realities, how does a .pany prevent attack? First, the .pany must thoroughly analyze and understand their vulnerabilities which are all potential entry points for an attacker. The sophistication of the modern attack is so high that they only need to find one vulnerability to gain full access. Once vulnerabilities are mapped, work on a schedule to remediate them. Second, you must educate all users about the threats. This is especially critical for any personnel who have access to secure .pany data. Education is an ongoing process and must be kept fresh. Third, invest in and build additional defenses to shield all remaining vulnerabilities. Make sure that employees are drilled on the defenses and that they are used. One growing trend is the use of two factor authentication, requiring employees to carry token generation devices with them, so in addition to needing a password, they need to enter a secure code from the token for authenticated access, making it more difficult for an attacker to gain access. These tokens can be delivered by smart phone. About the Author: 相关的主题文章: