Categories: Newsletter

Networking Monitoring News – July 2016

Symantec and Norton Antivirus

If you are running Symantec and Norton Antivirus you will need to patch your systems immediately as all products contain multiple vulnerabilities. Exploitation of these products could allow hackers to take complete control of your systems. A total of 24 products are affected across all platforms.

Symantec has released patches and hotfixes which should be deployed as quickly as possible. The ease of attack and the popularity of Symantec products will make this a very popular target.

Authentication

If you are looking to secure critical assets within your organization, consider implementing two factor authentication. You can use a hardware token or a mobile app such a Google Authenticator.

Attackers

“The adage is true that the security systems have to win every time, the attacker only has to win once.” — Dustin Dykes.

The low hanging fruit for attackers are your users. Attackers will focus on them until we get more proactive in monitoring our networks and take control. User education is needed as well, they are the target and need to know what to look out for to better protect themselves and the company.

Getting Secure

It is impossible to be 100% secure. Following a few simple steps can help make a difference.

  1. Educate Employees
    • Arm them with knowledge on what to look out for.
  2. Prevention
    • Invest in prevention methods.
  3. Detection
    • Monitor your network.
  4. Recovery
    • Better backup software, better network segmentation and data loss prevention tools all help IT recover faster with less productivity loss.
Ron Samson

Share
Published by
Ron Samson

Recent Posts

Microsoft Endpoint Detection and Response vs Other EDR Solutions

Organizations heavily invested in the Microsoft ecosystem face an interesting decision when selecting endpoint protection.…

2 weeks ago

Endpoint Detection and Response Vendors: What to Look for in a Trusted Provider

Choosing the right endpoint security solution can make the difference between stopping a breach early…

3 weeks ago

The Role of Security Information and Event Management Tools in Threat Detection

Cyber threats have become so sophisticated that detecting them requires more than just installing antivirus…

3 weeks ago

Cyber Security Operations Center: Key Features for Stronger Cyber Defense

Modern organizations face relentless cyber threats from multiple directions—ransomware gangs, nation-state actors, insider threats, and…

56 years ago

Integrating MDR Software into Your Existing Security Infrastructure

You've invested significantly in security tools over the years. Firewalls, endpoint protection, email security, network…

4 weeks ago

How a Security Information and Event Management System Enhances Threat Detection

Cybersecurity teams face an overwhelming challenge: how do you spot a genuine threat when your…

56 years ago