Defensive approaches for APTs

By
Page 4 of 4  |  Single page

Security tips: Top 10

Defensive approaches for APTs

Security is weakest at the human level. Therefore, organizations should:

  1. Implement consistent security awareness training with associated testing to gauge effectiveness.  
  2. Enforce security in all projects at the concept phase. Incorporating controls later in the implementation results in increased costs and less effective results.
  3. Develop procedures to ensure data stored on removable media devices is always encrypted. Delete files from flash drives as soon as possible.  
  4. Protect passwords, change them often and do not write them down and leave them unsecured.
  5. Develop an effective policy for use of social media to limit the potential loss of critical company information, while leveraging the marketing flare of social media.
  6. Review access control frequently to prevent “privilege creep.” This is critical as employee roles expand.
  7. Consider application whitelisting (allowing the use of good applications and prohibiting bad ones) for employees who routinely manage sensitive data.
  8. Conduct periodic risk assessments to manage security spending effectively. Apply controls based on risk to the business.
  9. Move to multifactor authentication where feasible.
  10. Use a program that either prevents or warns you about navigating to a known spyware site.

Source: Unisys

Previous Page 1 2 3 4 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

University of Western Australia resets all staff and student passwords

University of Western Australia resets all staff and student passwords

"Shade BIOS" stealth malware hides below operating system

"Shade BIOS" stealth malware hides below operating system

Accenture to buy Australian cyber security firm CyberCX

Accenture to buy Australian cyber security firm CyberCX

"BitUnlocker" full-volume encryption bypass found by Microsoft researchers

"BitUnlocker" full-volume encryption bypass found by Microsoft researchers

Log In

  |  Forgot your password?