REDLEGG BLOG

Vulnerabilities

Jan 10, 2018 12:54:43 PM  |  by Max Kurinsky

So, you think you’re safe. You’ve got a tech guy, he’s your top salesman’s nephew. He does the job, he can plug in ethernet cables and troubleshoot a browser with too many toolbars. He even installed Norton anti-virus on all the company desktops! What he doesn’t about is the botnet that is running in the background of your network.

This type of situation is not uncommon in small to medium sized businesses. A worm can get into a network and have no visible results, yet it still is leaching bandwidth and propagating itself. A type of worm like this could spread across an entire network and become activated. Once activated it would steal countless confidential customer files. This sort of breach can and does happen to companies of every size. Not only is it a legal disaster, it is not a good public image to project.

A breach of this magnitude could have been prevented by having a 24/7 MSS service provider monitoring your network. Setting up rule sets, monitoring patterns, providing documentation. You don't need to be a large company to have a security operations center.

Subscribe to Our Blog

Follow everything RedLegg as we provide comprehensive solutions for real-world data protection and security challenges.

Recent Articles

Two Data points is a trend. Three Data points is a story

Two Data points is a trend. Three Data points is a story

Data is the building block of everything we see and do in the Digital Age. But our reliance on data goes beyond that. ...
Top 5 Benefits to Hiring a vCISO (Virtual Chief Information Security Officer) blog

Top 5 Benefits to Hiring a vCISO (Virtual Chief Information Security Officer)

Every day, there seems to be a news story about the latest data security breach. Guarding the privacy of company ...