Minimize risks from security attacks
Increasing strict control of employee software installation will help companies improve the network security situation.
Most network security problems have a common cause: end users (end-users) install or run programs that are not managed or not approved by network administrators (admin) . Most attacks on network security occur because users accidentally install malware (malware is software that corrupts application program functionality, trying to hide, avoid being detected by the malware). anti-spyware, virus and system utilities), in which many programs are very dangerous and will be attacked immediately after installation such as viruses, worms (worms), Trojans, and spyware (spyware).
Meanwhile, there are many other programs that were very helpful at first but then facilitated other forms of security attacks to appear. It can be said that any software installation action, whether it is Skype, Java, RealPlayer, Firefox, QuickTime, iTunes, or even anti-virus software, increases the risk of attack. For example, if the company allows employees to install Macromedia's Flash tools, the computer system may be attacked by malicious Flash control codes. Or install fast search toolbars or search from Google's desktop, the secret information in the computer is also in danger of being retrieved. Even if the company allows employees to use personal CDs on the company's computer, the risk of malware malware penetration is also very high.
Therefore, what companies need to do to minimize network security weaknesses are: Control software installed and applied by employees; recognize which web browser add-ins are running on the machine and which ActiveX controls are installed (ActiveX controls are standard systems for building components in the environment Windows school); IT professionals must control at the highest level and proceed with the installation license. Of course, these measures are often said to be costly in time and money, but in fact, it will be impervious when compared to the time and money that companies have to spend when battling malware. , viruses, worms, Trojans, spam and other forms of attack.
Although, in fact, controlling 100% of what employees install or download from the Internet is nearly impossible, but companies can also control computer security risks if built. a control plan on the basis of considering the following factors:
- Set up and educate employees about the company's software installation policy, for example, they must know that the software they intend to install requires admin approval.
- Encourage employees what types of software to avoid installing, make them understand that any software is potentially, more or less, directly or indirectly, the risks to network security.
- Provide a mechanism that allows admin to know what programs employees are running on their computers. If the company cannot control the installation, it is necessary to know which programs the employees are running.
- Build a process to ensure new applications are installed safely, such as companies that want to remove some software applications such as file sharing (file-sharing) or peer-to- peer.
- Make sure to enable auto-update, if available, of the software. However, this feature should not be completely trusted because some new versions of the software are unable to remove older, vulnerable code like Sun's new versions of Adobe Acrobat or Java. Microsystems.
- Remove all programs with high security risks, along with penalties for recidivists in software installation.
- Set up a method to monitor content layers to prevent unlicensed protocols from entering the computer system when installing application programs.
- Raise admin's awareness of new programs and ask them to immediately report to the IT Manager about the newly discovered risks for analysis and timely measures.
One thing is for sure, office workers will continue to install, download more and more software and so the threat to network security will be unpredictable. What we can do is control what is installed and running on managed computers.
Ba Lam
You should read it
- What is Crowdsourced Security?
- SpaceX reportedly bans use of Zoom videoconferencing app by employees
- New attack method 'bypasses' security software
- What to do when the relationship between staff and boss is stressful?
- Alternatives to 'expensive' software
- Protect businesses from anger from former employees
- Why shouldn't there be more than one antivirus on a Windows PC?
- Anti-virus programs catch up with the Windows WMF vulnerability
May be interested
- DNS attacks are costing governments worldwide huge amountsgovernment organizations in each country suffer an average of 12 dns attacks per year.
- Threats and risks from malware on USB Flashin addition to the undisputed benefits, usb flash drives sometimes contain risks that cannot be underestimated if not used properly.
- Top 10 attack techniques on the websecurity experts have listed the top 10 attacks on the web and forecast online banking transactions at the highest risk of hackers. the discovery of duong ngoc thai, a vietnamese security expert, ranks first.
- Microsoft warns of an increasing trend of attacks targeting firmware and worrying public indifferencethis is indeed a worrying 'lethargy', especially given the recent increase in the number of attacks targeting system software.
- Protect Microsoft Exchange in virtual and physical environmentsthis article will show you how to identify the risk points of error and some of the best actions to minimize or eliminate these risks, depending on the needs of availability. how is exchange for your company as well as for resources and treasury?
- Some ways to avoid the risk of computer attackssymantec vietnam has just released some guidelines for domestic users to handle computer security risks
- Stalkerware and security risks for businessessome legitimate, useful and necessary applications can be turned into stalkerware if they fall into the hands of a hacker.
- How many DDoS cases are reported in 2019?ddos is a new form of attack, but it is always rated as the leading threat on the internet
- Hacker purged two-factor security just by automated phishing attackssurely many people still believe that protecting online accounts with two-factor authentication can be an effective way to fight hackers, but after the incident, we may need to think think!
- Alarming statistics on the situation of network security in our country in the first half of 2019the number of cyber attacks on our country's computer systems in the first 6 months of 2019 had a record increase.