6 Key steps to combat #Advanced #Cyber #Attacks To combat - TopicsExpress



          

6 Key steps to combat #Advanced #Cyber #Attacks To combat advanced targeted attacks, detection of zero-day malwares and C&C communications over SMTP or HTTP traffic, are just the baseline. Here are 6 critical, often overlooked steps to consider when defining a comprehensive solution against advanced persistent threats: 1. Detect lateral movements inside your networks Perimeter will not hold against targeted attacks. After initial penetration, attackers will move laterally within your network, to perform reconnaissance, to infiltrate other hosts, and to steal credentials. 2. Shield system vulnerabilities Attackers bet on the fact that you can’t deploy patches as soon as they, are announced. Most datacenter operation follows an internal change control process timeline that may be anywhere from 1 to 3 months before patches can be tested and deployed 3. Monitor critical systems for unauthorized changes To infiltrate as many hosts as possible, attackers poison website or internal servers frequented by you or your employees. They maliciously modifies the website code itself or some desired object on the server is poisoned. 4. Integrate advanced threat analysis with your existing security investments 5. Acquire customized signatures for endpoint mitigation Detection of C&C communication is just the tip of an iceberg. You’ll need to quickly clean up compromised endpoints – possibly a lot of endpoints. Have an anti-malware vendor that can create custom signatures immediately, especially for you, will be a godsent 6. Retain external resources for 24x7 monitoring and incident response IT staffs are often over-stretched in bandwidth not to mention the skill sets needed for a security breach investigation and response is quite unique
Posted on: Fri, 01 Nov 2013 06:31:48 +0000

Trending Topics



Recently Viewed Topics




© 2015