SHARE
Facebook X Pinterest WhatsApp

Move Them To A Whitelisting Model </b><br>One reason so many modern attacks are working is because organizations make it possible to download and run arbitrary code on endpoints across their infrastructure. <br><br><b>What The Experts Say:

Move Them To A Whitelisting Model One reason so many modern attacks are working is because organizations make it possible to download and run arbitrary code on endpoints across their infrastructure. What The Experts Say: "In some environments with very focused computing tasks, switching to a smartphone model where only vetted and signed executables are […]

Sep 23, 2010
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1Move Them To A Whitelisting Model
One reason so many modern attacks are working is because organizations make it possible to download and run arbitrary code on endpoints across their infrastructure.

What The Experts Say:

"In some environments with very focused computing tasks, switching to a smartphone model where only vetted and signed executables are allowed to run on the desktop can allow organizations to minimize the chance of infection."

2Fine Tune Their Configuration Management
A default deny model is not always possible and takes time to develop-but that doesnt mean an organization should throw up its hands.

What The Experts Say:

"As an interim measure to secure against attacks, DVLabs advises implementation of strong and comprehensive configuration management."

3Build Security Into Web 2.0 Applications
As services keep moving to the cloud, attackers are increasingly shifting their sights to Web applications, looking for low-hanging vulnerabilities.

What The Experts Say:

"Companies need to be very careful about moving more and more functionality onto the Web without ensuring its security."

4Set Up Developer Education
Setting up security training for developers who code Web applications-supported by automated testing tools-will greatly diminish risk of attacks on critical applications.

What The Experts Say:

"The potential impact of deploying new Web applications is rarely understood. Many times these applications directly access sensitive information, and if compromised, give attackers the means to steal this data quickly and easily."

5Have Employees Log Off Websites Before Clicking Untrusted Links
A lot of CSFR attacks know that many users tend to stay logged into important Web sites and leverage that.

What The Experts Say:

"In order to help prevent Cross Site Request Forgery attacks, it is important to log off of important websites prior to clicking links in email or on untrustworthy websites."

6Patch Religiously
So many attacks today take advantage of well-known vulnerabilities. Automating your clients patching is one of the most effective ways of greatly reducing their risk of attack.

What The Experts Say:

"It is more important than ever for organizations to have an accurate inventory of user applications and a defined patch strategy."

7Establish A Point Man
Help your client identify one person to take responsibility for keeping up to date on vulnerability announcements and attack trends by subscribing to mailing lists and industry RSS feeds. Or better yet, become that point man

"Organizations should designate specific security personnel with the job of monitoring public announcements of new vulnerabilities and widespread attacks."

8Monitor For Anomalies
Attackers these days dont just announce themselves. Your customers have got to be on the hunt for unusual network behavior and other clues of attack in order to stop problems before they do real damage.

What The Ex

"Organizations should continuously monitor for anomalous and suspicious behavior on their computer systems and networks to detect attacks early on and minimize the damage."

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.