Categories: Newsletter

Networking Monitoring News – July 2016

Symantec and Norton Antivirus

If you are running Symantec and Norton Antivirus you will need to patch your systems immediately as all products contain multiple vulnerabilities. Exploitation of these products could allow hackers to take complete control of your systems. A total of 24 products are affected across all platforms.

Symantec has released patches and hotfixes which should be deployed as quickly as possible. The ease of attack and the popularity of Symantec products will make this a very popular target.

Authentication

If you are looking to secure critical assets within your organization, consider implementing two factor authentication. You can use a hardware token or a mobile app such a Google Authenticator.

Attackers

“The adage is true that the security systems have to win every time, the attacker only has to win once.” — Dustin Dykes.

The low hanging fruit for attackers are your users. Attackers will focus on them until we get more proactive in monitoring our networks and take control. User education is needed as well, they are the target and need to know what to look out for to better protect themselves and the company.

Getting Secure

It is impossible to be 100% secure. Following a few simple steps can help make a difference.

  1. Educate Employees
    • Arm them with knowledge on what to look out for.
  2. Prevention
    • Invest in prevention methods.
  3. Detection
    • Monitor your network.
  4. Recovery
    • Better backup software, better network segmentation and data loss prevention tools all help IT recover faster with less productivity loss.
Ron Samson

Share
Published by
Ron Samson

Recent Posts

NOC vs SOC: How to Choose the Best Option for Your IT Infrastructure

In today's digitized world, the protection of a business's IT infrastructure has become more crucial…

2 weeks ago

SIEM and SOC: Key Differences and Why You Need Both

As cybersecurity threats grow more complex, organizations are turning to advanced solutions to protect their…

2 weeks ago

SIEM vs EDR: A Comprehensive Guide to Their Strengths and Uses

In the world of cybersecurity, two powerful tools frequently come up in discussions around threat…

3 weeks ago

SIEM Security Tool vs. Traditional Monitoring: What’s the Difference?

In the ever-evolving cybersecurity landscape, businesses are increasingly looking for ways to protect their data…

4 weeks ago

Choosing the Right Managed SIEM Solutions for Your Organization

In an increasingly digital world, businesses must be able to monitor, detect, and respond to…

4 weeks ago

What Does EDR Stand For in Threat Management?

In today’s digital world, security is a priority for every business, regardless of size. Cyber…

1 month ago