Categories: Newsletter

Networking Monitoring News – July 2016

Symantec and Norton Antivirus

If you are running Symantec and Norton Antivirus you will need to patch your systems immediately as all products contain multiple vulnerabilities. Exploitation of these products could allow hackers to take complete control of your systems. A total of 24 products are affected across all platforms.

Symantec has released patches and hotfixes which should be deployed as quickly as possible. The ease of attack and the popularity of Symantec products will make this a very popular target.

Authentication

If you are looking to secure critical assets within your organization, consider implementing two factor authentication. You can use a hardware token or a mobile app such a Google Authenticator.

Attackers

“The adage is true that the security systems have to win every time, the attacker only has to win once.” — Dustin Dykes.

The low hanging fruit for attackers are your users. Attackers will focus on them until we get more proactive in monitoring our networks and take control. User education is needed as well, they are the target and need to know what to look out for to better protect themselves and the company.

Getting Secure

It is impossible to be 100% secure. Following a few simple steps can help make a difference.

  1. Educate Employees
    • Arm them with knowledge on what to look out for.
  2. Prevention
    • Invest in prevention methods.
  3. Detection
    • Monitor your network.
  4. Recovery
    • Better backup software, better network segmentation and data loss prevention tools all help IT recover faster with less productivity loss.
Ron Samson

Share
Published by
Ron Samson

Recent Posts

The Future of Cybersecurity: Best EDR Solutions with AI Integration in 2025

Endpoint Detection and Response technology has transformed dramatically as artificial intelligence capabilities have matured and…

2 days ago

Why SOC Threat Intelligence Is Essential for Preventing Cyber Attacks

Security Operations Centers face an overwhelming challenge: detecting and stopping sophisticated attackers who constantly evolve…

6 days ago

SOC Monitoring Best Practices: How to Strengthen Your Cyber Defense

Security Operations Centers serve as the nerve center of modern cybersecurity programs, providing continuous visibility…

1 week ago

The Best SOC for Small Businesses: Key Factors to Consider Before You Buy

Small businesses face the same sophisticated cyber threats targeting large enterprises, yet they typically operate…

2 weeks ago

Why Managed Threat Detection and Response Is Essential for Modern Cybersecurity

The cybersecurity challenge facing organizations today extends far beyond installing firewalls and antivirus software. Modern…

2 weeks ago

Comparing MDR Providers: Key Features and Benefits You Should Know

Cybersecurity threats continue to grow in sophistication, while many organizations struggle to maintain adequate security…

3 weeks ago