Cybersecurity threats are cumulative and this phenomenon of “threat cumulativity” means that a surge in criminal abuse of computing resources to mine cryptocurrency does not create a shortage of criminals to develop and deploy RDP exploitation techniques in order to create a profitable attack vector for ransomware. Likewise, battening down your organization’s use of RDP – which needs to happen for a variety of good reasons – does not mean that anti-phishing training should be neglected.
The white paper makes it clear that – along with effective employee education – organizations need: sound security policies that are comprehensively applied and firmly enforced; the right mix of security products and tools, including tested backup and recovery systems; and a constantly updated incident response plan. Even with all of these, plus constant vigilance, you are not guaranteed immunity from attack; however, you can greatly increase your odds of deflecting attackers and/or recovering from an attack.

| Format: |
|
| Topics: | |
| Website: | Visit Publisher Website |
| Publisher: | We Live Security by ESET |
| Published: | October 28, 2018 |
| License: | Copyrighted |
| Copyright: | © ESET All Rights Reserved. |