部落格

Weak Links in Security Part 2: How to Create a Secure Network Configuration

Posted on April 25, 2018 by Gento

The 2017 Data Breach Investigations Report (DBIR) revealed that 51 percent of breaches involved the use of malware. Of these breaches, 66 percent were initiated via phishing campaigns that used malware infected email attachments. As discussed in Part 1: Configuration Is the Biggest Security Threat, there are five steps that businesses need to take to mitigate configuration security risks. These steps include: endpoint protection, strong passwords, a restricted number of login attempts, alternative authentication, and limited access to critical systems. Upon completing these steps the next task will be to ensure that all devices, communications, logging, and vulnerability responses are properly configured to create a secure network for your vital business data.


Page 4 of 8 pages ‹ First  < 2 3 4 5 6 >  Last ›

訂閱

近期活動

New Zealand Cloud & Datacenter Convention 2022
3 November 2022, 9am – 4pm  •  Grand Millennium Hotel, Auckland, New Zealand
Data Centre World Singapore
12th – 13th Oct 2022
Korea Cloud & Datacenter Convention 2022
6th Oct 2022
Philippines Cloud & Datacenter Convention 2022
4th Aug 2022
JANOG50 Meeting Hokkaido
3th – 15th July 2022

View all Events

Raritan最新新聞

—ISO27001 認證為 Legrand 羅格朗品牌(包括 Raritan®、Server Technology® 和 Starline® 品牌)經過徹底測試的數據、電源和控制設備的安全性提供了保證。
Posted on July 1, 2024
Legrand 使用兩大創新智慧型機架 PDU 重新活化資料中心產業
Posted on May 1, 2023
Exclusive interview丨How does Huizhou upgrade its manufacturing industry?
Posted on December 2, 2021
Raritan 發表 MasterConsole® 數位雙電腦切換器
Posted on February 18, 2021
Legrand Data, Power and Control Division Announced as Finalist in Six Categories at DCS Awards 2020
Posted on November 9, 2020

View all news