Protect your business against internal threats
Tips to help you avoid assault attacks take control of computer networks in San Francisco.
Tips to help you avoid attacks similar to taking control of computer networks in San Francisco.
In July 2008, a disgruntled network administrator named Terry Childs took control of the computer network in San Francisco, preventing other network administrators from accessing the system.
Photo: www.cssecure.com
Details of how Childs used to carry out the case are still being investigated. However, it seems that Childs has changed the passwords of routers and switches a lot, then removed access for all employees of the San Francisco Ministry of Information and Communications, leaving him in total control. system.
Why does an individual have the privilege of administering the entire system? How can an extravagant act like changing a series of passwords be done without encountering any obstacles? And finally, the most important question: What do you draw from the attack and how do you protect your work from the danger that exists inside?
Security experts use the term 'threat' to refer to things that are likely to harm your system. One of the most dangerous threats is an internal vandal with a deep understanding of the system.
Fred Pinkett, Vice President of Core Security Technologies, a security company based in Boston and Buenos Aires, has given some advice to building a strategic security layer that helps to limit the ability of insiders to sabotage.
1. Division of roles and duties closely.
No one has access to everything. If you have a lot of administrators, separate your work, so don't let an individual or a group have full access to all computer networks. This will ensure that no single individual is able to knock down the entire system.
2. Consider carefully if managing sensitive data.
If you have a modest budget, can't afford to recruit employees for IT positions, take a step back and consider the importance of your job security. If you manage credit card information or other sensitive data, you should consider transferring the IT department to a company that has the financial ability to fully recruit the necessary position to operate. security system. If not, with such an open system, it's best not to manage sensitive data anymore.
3. Pay special attention to backup strategies.
The department responsible for backing up and storing data needs to be separate from network administrators and system administrators. Otherwise the backup copies will be very vulnerable in the attack.
4. Invest in a solid security system.
Building a multi-tiered defense system, using a firewall combined with maintaining suspicious moves is the key to a solid security system.
5. Install intrusion detection system (IDS).
In the San Francisco case, the IDS system can detect the process of changing passwords in bulk and give timely alarms. Remember that a rebellious attack can start from the inside, so if you focus all the firepower outside, you will experience heavy losses.
6. Encryption, encryption and encryption.
All sensitive data needs to be encrypted in any case. Imagine if your data were in packages, when the cargo truck was in distress, where would the packages fly, where would the customer credit card information fly? Therefore, it is best to encrypt the data.
7. Security is a regular and continuous process.
Once you have fully implemented the above strategies, remember that security is a regular and continuous process. Monitoring and checking the current situation needs to be done regularly. Try starting from the outside, entering your defenses and wondering: If a hacker invades this security layer, what will he do? The answer may surprise you.
The key is not in professional architecture: people and ways of handling are important factors. If you can master all three factors, you are able to resist attacks similar to those in San Francisco.
You should read it
- List of the 3 most dangerous and scary Ransomware viruses
- 5 WhatsApp user security threats need to know
- Awareness and experience - the most important factor in every network security process
- How to fix 5 common security threats on iPhone and iPad
- Symposium on IBM Security and Security 2011
- Enhance security with multi-layer defense system
- Network security and the need to know
- Security threats in VoIP
- IBM embarked on FPT to distribute new network security solutions
- Risks from malware and how to prevent it
- 13 better security tips for Joomla CMS
- 7 SaaS security threats to know in 2023
Maybe you are interested
Here's How To Protect Your Business From Illegal Online Marketing And Sales Why Text Messaging Is Still Relevant In A World Of Smartphones Which is better, HelloFresh or Blue Apron? We compare meal delivery kits How to Access Public Folders in Outlook 2016 on PC or Mac How to Sign a Painting How to create personal signature extremely fast on the iPhone to sign the papers as needed