Protect your company from these six types of network security threats (Part 2)

12/21/18 11:00 AM  |  by RedLegg Blog

Go back to part one

4. Device loss/theft

GDPR and other privacy mandates are just one end of the spectrum of concerns for business owners when sensitive device data is lost to an external entity. Depending on the data, the damage that loss or theft can cause to an organization's reputation can be catastrophic. File-level encryption can protect sensitive files, but an attacker gaining access to a device can eventually brute-force the password. Leveraging the full-disk encryption included in most modern operating systems, however, can ensure that the attacker obtains no access to any files on the disk. Another method is to use LoJack—a software tool that not only assists in tracking stolen devices and remotely wiping the data, but also re-installs itself even if the attacker flashes the firmware. The remote wipe feature allows you to delete files permanently from stolen devices to control loss of sensitive data. To protect your data from even the most expert attackers, utilizing split-data encryption to store data and keys across multiple cloud service providers is a more effective—but expensive—means of ensuring that the data is never even available on the stolen or lost device.

5. Malware

More than any other threat, the adage prevention is better than cure applies to the broad threat potential of malware because once it's in the network, a worm, ransomware or virus could infect so many systems that companies could lose millions of dollars in a single day in lost data and productivity. Viruses can infect the Master Boot Record and firmware, which enables them to survive a full-disk wipe. Still worse is spyware from competitors that can eavesdrop and steal confidential data, remaining undetected for many years. RedLegg helps your organization prevent such attacks with expert recommendations regarding appropriate security configurations, as well as our Advanced Threat Defense (ATD) and Endpoint Detection and Response (EDR) services that not only monitor, quarantine, block and identify stealthy, suspicious events, but also ensure that software is up-to-date and safe from exploits.

6. Exploitable Vulnerabilities

The compromise of a billion Yahoo accounts in 2016 was possible due to passwords hashed with an outdated 128-bit MD5 algorithm, a simple problem that could have been mitigated by a thorough security audit. Similarly, the Heartbleed vulnerability in OpenSSL has shown how crucial it is to keep your software updated. Our team believes in keeping all bases covered, not only to minimize the attack surface but also to proactively search for potential weak spots before they are discovered by an attacker. We help protect you with a range of penetration testing tools and best practice recommendations that range from secure code reviews to automated patch updates, network penetration tests, web application tests, mobile app tests and scanning for potential vulnerabilities.

To conclude

During the past decade, our team of security experts have seen how the adoption of a supportive, proactive and simple common-sense approach has given employees and managers the peace-of-mind that allows them to focus on core business functions while resting assured that their networks are protected. Cyber threats evolve over time: we believe not just in building long-term relationships with our partners, but also in providing the most relevant, strategic infrastructure that anticipates and mitigates threats. That's the best way to keep you safe. Protect your company from these six types of network security threat.

Want more? Read about...

Get Blog Updates

Related Articles

Critical Infrastructure Protection And Security with Phil Grimes pen testing, industry news

Critical Infrastructure Protection And Security with Phil Grimes

We're reviving an oldie-but-a-goodie this week as we revisit the heart of Critical Infrastructure Protection and SCADA ...
Optimizing Your Vulnerability Scans: From Beginning To End pen testing, vulnerability

Optimizing Your Vulnerability Scans: From Beginning To End

A vulnerability scan should be concentrated on compiling a complete catalogue of vulnerabilities that affected the ...
New call-to-action