Categories: Newsletter

Networking Monitoring News – July 2016

Symantec and Norton Antivirus

If you are running Symantec and Norton Antivirus you will need to patch your systems immediately as all products contain multiple vulnerabilities. Exploitation of these products could allow hackers to take complete control of your systems. A total of 24 products are affected across all platforms.

Symantec has released patches and hotfixes which should be deployed as quickly as possible. The ease of attack and the popularity of Symantec products will make this a very popular target.

Authentication

If you are looking to secure critical assets within your organization, consider implementing two factor authentication. You can use a hardware token or a mobile app such a Google Authenticator.

Attackers

“The adage is true that the security systems have to win every time, the attacker only has to win once.” — Dustin Dykes.

The low hanging fruit for attackers are your users. Attackers will focus on them until we get more proactive in monitoring our networks and take control. User education is needed as well, they are the target and need to know what to look out for to better protect themselves and the company.

Getting Secure

It is impossible to be 100% secure. Following a few simple steps can help make a difference.

  1. Educate Employees
    • Arm them with knowledge on what to look out for.
  2. Prevention
    • Invest in prevention methods.
  3. Detection
    • Monitor your network.
  4. Recovery
    • Better backup software, better network segmentation and data loss prevention tools all help IT recover faster with less productivity loss.
Ron Samson

Share
Published by
Ron Samson

Recent Posts

Endpoint Detection and Response (EDR) Comprehensive Overview

In a digital era where cyber threats lurk behind every click, Endpoint Detection and Response…

1 month ago

Managed Antivirus: Overview & Guide

In the modern digital age, where cybersecurity threats continue to evolve and become more sophisticated,…

54 years ago

What is a Virtual CISO and How Can it Help Your Cybersecurity?

In today's digital landscape, information security is paramount. However, many organizations struggle to allocate resources…

12 months ago

Endpoint Security Services: A Comprehensive Endpoint Security Solution

Every connected device that a business uses can act as a potential entry point for…

12 months ago

Why a Managed Security Operations Center is Essential for HIPAA Compliance

Healthcare organizations are responsible for handling sensitive patient information on a daily basis. With the…

54 years ago