Article written by cyber security expert Yuri Tsibare.
Those days when cyber security means to stop the annoying virus like love bug. Today, it is a large -scale, financially induced cyber crime industry. The attacks are clever, sharp and more harmful – and this product changes everything for teams.
For excise managers (PMS), it is understandable that the attackers are constantly exploiting the same weak spot: stolen administrators, missing multi-factor authentication (MFA) VPN, remote encryption, and clever “Living of Land” (Lottle) Tricks of Office of the Office of the Office of the Office of the Office of the Office of the Office of Popacle.
Even simple as an unpired firewall or a wicked USB drive can open the door for a violation.
New weaknesses and zero are popping at all times, and product teams have to stay on their toes. some examples:
- Wannacry (2017): Use eternalblue defects in SMBV1 to spread ransomware rapidly. This forced companies to completely neutralize the SMBV1.
- Some exchange server bugs, Let the attackers run malicious scripts, sometimes lead to ransomware.
- Log4J vulnerability: A vulnerability in a popular Java logging framework that enables arbitrary code execution. Still showing in the old firewall and VPN.
- Folina (msdt): Allow the office apps to launch Powershell without any user interaction.
Timely patching helps, but it is not enough. There is always a difference between the discovery of a defect and fixing it. This is why teams require layered rescue and a mentality that are ready to respond to events because they occur.
How Breach Reports run real -time product shift
100 days to secure your environment From Webinar Series Charthlocker The event is a great example of operating development. This helps security leaders to focus on what matters the most in their first few months.
Real world violations often give rise to direct new product features or policy changes. This way:
- Unlocked machines: A threat actor Once the computer of a hospital was accessed which was left open and run the Powershell. Now, password-protected screen savers are one essential.
- USB data theft: The USB drive is still a go-two to steal data. Products now provide fine USB control-blocking annechripted drive, limiting file types, or how many files can be copied.
- lateral movement: The ransomware often spreads using old administrator accounts. The equipment now detect and removes them after review.
- Lottle attacks: Folina showed how legal devices could be misused. Ringfaeing ™ helps prevent apps By launching the things they should not do.
- Outbound Traffic Abuse: Attacks like solarwind used outbound connections. Now, default-law policies are becoming standard for server traffic.
- Stolen credibility: The MFA is non-paralysis for cloud accounts, remote access and domain controllers.
- Weak VPN: The unexpected VPN is a major risk. The features now include IP-based access control or even disabled of unused VPN.
PM’s response: Advisor to actionable facility
For cyber security PMS, reacting to dangers means more than writing advice. It is about the manufacture of smart, safe products. This way:
- Get full visibility
Understand what is going on in your environment. Use monitoring agents to track file activity, privilege change, app launch and network traffic. - Prefer the risk
With a complete photo, PMS can focus on high -risk equipment and behaviors:- Remote access tools like TeamViewer or Anydesk
- Software with too many permissions (eg, 7-jyi, NMAP)
- Risk browser extension
- Software from high -risk areas
- Drive adaptive policy creation
Security policies should develop with the danger scenario:- Test first: Use monitor-only mode and test groups before implementing new rules.
- Be accurate: Go to beyond/off switch-Dinemic ACLS, ringfaeing and app-specific administrative rights.
- Encourage adoption by reducing disruption
- Present a store of pre-informed apps
- Make it easier to request new software
- Explain why restrictions exist – it creates confidence
- Continuous improvement and monitoring:
- Use health reports to spot misunderstandings
- Block USB file copies if more than threshold
- Clean the old policies and unused apps regularly
- Embrace patch management
Ensure that everything is up -to -date from operating system to portable applications such as putty -post. Use the tool to find the missing patch and test them with pilot users before rolling out. - Protect backup
Backup should be preserved by compromise. This involves limiting which apps can access them and MFA is required for backup services. PMS should test the backup regularly to validate recovery readiness.
Cyber security PM is on the forward lines of using real -world security against real -world dangers.
By staying informed, collecting correct data and building with users, you can reduce the risk without making life hard for your team.
Sponsored and written by Threatening,