• krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • Responding to heightened cyberattack risk: Focus on the basics
    Home SecurityNetwork Security Responding to heightened cyberattack risk: Focus on the basics

    Responding to heightened cyberattack risk: Focus on the basics

    Source Link

    A SANS Institute webcast about Russian cyberattack escalations in Ukraine presented a couple of takeaways. The first: Don’t panic. Too often with security issues we think the worse; we may overreact and make the situation worse. Instead, focus on the basics. The second is that we need to pay more attention to network traffic.

    Take care of security basics first

    When reviewing your network for potential cyber threats, don’t make things worse by making misconfigurations that will create more problems. Spend time on the basics and on other projects that you probably should have worked on earlier.

    Documentation and planning are what you need to be doing now, not making changes and configuration adjustments. Slow down and review plans rather than make dramatic changes. Configuration changes often introduce side effects that make you think an attack is underway from external sources. A website is offline. Immediately we think of a cyberattack, but the root cause is often Domain Name Service (DNS) misconfigurations or core infrastructure issues.

    Take the time to review and consider targeted entry points. Learn the lessons from the Maersk ransomware attacks that started from the Ukraine. Review what business-to-business entry points come from weak links. Review all virtual private network (VPN) connections to your network and where they come from. Remember, their security impacts your security. Add two-factor authentication to these connections where appropriate and consider if you need to make temporary adjustments in who connects to your network during this time.

    I usually recommend holding off on patching until we know of any side-effects, but depending on your risk level you may want to test for updates on an accelerated basis and deploy sooner than normal. I also recommend reviewing the commonly attacked vulnerabilities and ensure that you have patched your network for them.

    Last, but certainly not least, don’t become a source of funding for attackers. Ensure that you can recover from a ransomware attack and do not pay ransom to attackers. Having an offline backup should be a priority to ensure that you can recover in any situation.

    Copyright © 2022 IDG Communications, Inc.

    Related Articles

    Leave a Comment

    techhipbettruvabetnorabahisbahis forumutaraftarium24eduedueduseduseduseduseduedusedusedu
    padişahbet
    свит бонанза
    lüks casino
    casinomilyon giriş
    vegabet
    rokubet giriş
    betmatik
    cashwin giris
    betwild giris
    rexbet giriş
    padişahbet
    neyine
    kingbetting güncel giriş
    betwild giris
    pin up aviator
    biabet giris
    imajbet giriş
    plinko romania
    sugar rush 1000
    biabet giriş