Protecting Against Attack: Eight Ways To Limit Your Vulnerability

  • By

    Ericka Chickowski

    | Posted 2010-09-23
  • Email
 
 
 
Previous
Move Them To A Whitelisting Model </b><br>One reason so many modern attacks are working is because organizations make it possible to download and run arbitrary code on endpoints across their infrastructure. <br><br><b>What The Experts Say:
Next

Move Them To A Whitelisting Model
One reason so many modern attacks are working is because organizations make it possible to download and run arbitrary code on endpoints across their infrastructure.

What The Experts Say:

"In some environments with very focused computing tasks, switching to a smartphone model where only vetted and signed executables are allowed to run on the desktop can allow organizations to minimize the chance of infection."
If you or your customers have been hit with a cross site forgery request (CSFR) and blended attacks using PDFs, you aren't alone. These kinds of attacks and others have been steamrolling organizations with their malicious success. Recently HP's TippingPoint DVLabs, Qualys and SANS got together to put out a report on the top technology attack trends for the first half of 2010, which found that these kinds of attacks are hitting companies more often. Smart companies need to be vigilant to these IT security threats and take the proper measures to reduce the risk. And channel partners and IT solution providers looking to add value to their IT offerings would do well to keep these attack threats in mind and focus on the following eight best practices, as laid out by the report. Here's how to protect your customers.
 
 
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date