Follow on Google News News By Tag Industry News News By Place Country(s) Industry News
Follow on Google News | How Do You Protect Your Business from Hackers Top 5 Attacks?Recently industry leading security penetration testers put together the most reliable methods for hackers to compromise a network. How do you protect your business from hackers top 5 attacks?
By: 365 iT SOLUTIONS Security penetration testers successfully compromised many organizations using the same kinds of attacks and surprisingly, zero-days (https://en.wikipedia.org/ What were the top 5 successful attacks? • 66% of attacks were successful due to abuse of weak domain user passwords • 64% of attacks were successful due to broadcast name resolution poisoning like WPAD (https://en.wikipedia.org/ • 61% of attacks were successful due to local admin password attacks • 59% of attacks were successful due to attacks on clear text passwords in memory • 52% of attacks were successful due to insufficient network segmentation How Do You Protect Your Business from Hackers Top 5 Attacks? It is important to understand that protection from these threats does not have to be complex and expensive. It is important to consult with your management team as well as your IT technical services team. There are some very simple and basic practices and tools in the market that would improve your organization's security and data. From the list above, attack number 3 and 4 are extremely simple to clean up if you deploy Microsoft's LAPS (https://technet.microsoft.com/ Clear text passwords in memory can be cleaned with a basic registry change. This can be covered by regular Microsoft Windows updates or the installation of Microsoft Security Advisory 2871997 (https://technet.microsoft.com/ Finally, you can also easily address number 1 and 2 as they are easy fixes and many need to change your IT policies however number 5 which is insufficient network segmentation (https://en.wikipedia.org/ There are some technical terms listed above and many of these may be a bit technical. Most business management professionals will not know what they, however, they should be addressed with your IT department, IT consultant or managed IT services provider to ensure your business is protected. 365 iT SOLUTIONS (http://365itsolutions.com/) Let our complimentary network and security assessment (http://365itsolutions.com/ End
Account Email Address Account Phone Number Disclaimer Report Abuse
|
|