According to one of the world’s largest cyber security conferences, RSA, there is no way to reliably stop future cyber attacks. This sounds rather dismal. Yet, depending on the security approach being deployed, it may be entirely accurate.
In order to effectively stop future cyber attacks, there are proactive approaches businesses of all shapes and sizes must consider when evaluating their cyber security solutions.
The use of application whitelisting as an organization’s primary means of malware detection will effectively thwart malicious files from being able to run on endpoints and servers. Unfortunately, application whitelisting does come with a few negative connotations. First, the risk of false positives, or the software misclassifying a safe program as potentially malicious. Second, the misconception that application whitelisting requires an increase in backend work from the IT professionals or admin team. This could be true, depending on the security solution. However, this is why it’s critical when deploying an application whitelist, users find a solution that uses an automated global whitelist. Therefore, the creation, maintenance
Malicious Script Blocking
Other major messages from RSA were certainly correct. For instance, cyber criminals are finding more and more ways to exploit systems to install malware. One of these ways is by bypassing executable files and targeting scripting agents like PowerShell and WScript. Unfortunately, few security solutions are doing anything about this. Finding a security program that effectively blocks malicious scripting attacks has been, and will continue to be critical.
Protecting RDP Ports
In addition to exploiting scripting agents, hackers are also targeting remote access ports. Why? Because these ports are often left enabled leaving an easy access point for hackers to brute force their way in. Users must conduct an audit of these open ports, evaluate if they need to remain enabled and establish proper controls if they cannot be disabled.
Some security solutions will help with this audit process, as well as the deployment of controls to minimize risk of intrusion. But not all.
Although there has been an overall theory that one cannot fully protect from what the future of
909 total views, 14 views today