Home SecurityNetwork Security Best advice for responding to today’s biggest cyber threats

Best advice for responding to today’s biggest cyber threats

Source Link

If you are like me, you follow world events and news such as Okta being breached by a group of teenagers to see if you need to change your defenses. This may not be a time to roll out new technologies or major changes to your network, as this will introduce other types of risk. Instead, consider taking these steps in response to current events.

Block traffic selectively

Blocking traffic from Russia and Belarus may help you limit noise from your log files, and if you run a customer-facing website, from trolls and spam comments, but blocking their location will not slow a dedicated attacker. They will merely hop on another VPN and come in from another location. If you do want to reduce traffic, review your business needs and limit to those countries and locations that you do business with.

Review how you use multi-factor authentication

The Okta breach made some of us rethink how multi-factor authentication (MFA) is implemented. We tend to roll out push-style MFA to make it easy on the users, but often this lures users into approving prompts without thinking about what is happening. Consider the risks of the users and for what they use MFA.

Microsoft is urging folks to move away from prompt-based two-factor authentication to matching an item. Already rolled out to their consumer-based Microsoft account MFA, the company is now using a prompt of a number to match.

Keep communications on threats relevant to users and leadership

Sending too much communication to staff and management about what should or should not be done is just noise. The sky is not falling, and that noise will only encourage people to tune out the important messages. Send communications only when it is relevant to your firm and can be actionable to your end users.

You still need to keep senior leadership informed about what is going on and perhaps what you are seeing in your log files. Use fact sheets on news items and security events, and prepare briefs to show where you have taken action, where you are researching actions to take, and what resources you might need to maintain or complete a goal.

Copyright © 2022 IDG Communications, Inc.

Related Articles

Leave a Comment

techhipbettruvabetnorabahisbahis forumutaraftarium24eduedusedusedueduseduseduseduedusedus
inagaming giriş
betmarino giriş
betwild giris
aviator casino
pin up aviator
plinko casino
kingbetting giriş
casino milyon
atlasbet giriş
betwild giris
sugar rush 1000
biabet giris
biabet giris
super gra
alev casino
cashwin giris
plinko romania
stake giriş
rulet oyna
rexbet giriş