Cybersecurity checklist. [Remote/Office]

Covid-19 pandamic has shown a major seismic shift in how businesses operate. Offices have shut down, and workers have gone remote.IT infrastructure is struggling to cope with an increase in demand while on the other, attackers are seeking to exploit vulnerabilities in this newly expanded remote work environment.

Outdated system, outdated software, remains vulnerable always.

Tactics To Reduce Cybersecurity Risks

Patch systems on a high. Patching remains a major priority for all systems. It’s quite difficult to achieve 100% . But it’s remains as a critical task to close all open exploits

Eliminate exposed ports and services. There has been a surge in the use of Remote Desktop Protocol (RDP) recently owing to the pandemic. RDP ports are often exposed to the internet, which led to remote desktop accounts reportedly being hit by millions of automated attacks recently. SMB & RDP ports remains as a major vulnerable ports for exploit

Protect against phishing with email protection system in place.It is also important to block potentially malicious file attachments (such as .exe, .bat, .js, .vbs, etc.) and also disable macros and Object Linking and Embedding (OLE) packages as these could launch malicious scripts.

Secure your web browser. Even the most legitimate websites can serve up a malware-laden advertisement. This technique is known as malvertising. Use of ad blockers and end-point security can help block such unwanted ads.

Deploy a EDR Soln. Patching, isolation and limiting risky behavior can greatly reduce the chances of cyber-attack. But it’s also no secret that many attacks happen from zero-day threats. EDR in place will reduce risk of been attack to an extent

Deploy a health check in place for VPN. Remote workers connecting to office sources need to be validated. Proper health check in place will always be a better option

Although nothing can guarantee absolute defense against threats, it’s important to keep a close eye on evolving cybersecurity trends and best practices to avoid unnecessary costs or business disruptions.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s