A nice summary of security best practices in response to breach activity last year - not much new...

Writing on Pro-Security Zone, Michael Aminzade, VP Global Compliance & Risk Services at Trustwave, summarizes lessons learned in 2014.

Device hardening is key - adopt CIS Security Benchmarks for an off-the-shelf hardened build standard.

Similarly, make sure that security best practices are being operated by any 3rd Party IT Service Providers - breach origin has frequently been traced back to 3rd party credentials/access being exploited.

Test security regularly, ideally continuously. Vulnerability Scanning and Penetration Testing are both highly effective for assessing cyber security defenses, but in fluid IT environments with lots of changes, security must be assessed continuously with an emphasis on breach detection. NNT's Closed-Loop Intelligent Change Control is the only way to maintain complete visibility of changes and spot malware when it strikes.

You cant always stop the breach, so make sure you are also geared to spot the breach when it does happen.

 

 

Read the full article

 

 

The Most Powerful & Reliable Cybersecurity Products
Contact Us

USA Offices

New Net Technologies LLC
4850 Tamiami Trail, Suite 301
Naples, Florida, 34103

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]

 

UK Office

New Net Technologies Ltd
The Russell Building, West Common
Harpenden, Hertfordshire
AL5 2JQ

Tel: 020 3917 4995
 [email protected]

SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Sans Institute Now Certified IBM Security
Copyright 2021, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.