Pub. 10 2015-2016 Issue 3
September/October 2015 17 Extraordinary Service for Extraordinary Members. Mark Faske is a security and compliance consultant for CoNetrix. CoNetrix is a provider of information security consulting, IT/GLBA audits and security testing, and tandem—a security and compliance software suite designed to help financial institutions create andmaintain their Information Security Program. Visit CoNetrix at www.conetrix.com . • Banking & Finance • Municipal Law • Bankruptcy • Employment Law • Business & Commercial Law • Sanitary & Improvement Districts 2120 South 72nd Street, Suite 1200, Omaha, NE 68124 (P) 402.391.6777 (F) 402.390.9221 www.crokerlaw.com Croker,Huck,Kasher,DeWitt, Anderson & Gonderinger,L.L.C. AT T O R N E Y S AT L AW Providing quality legal services to businesses and individuals in such areas as: • Real Estate • Estate Planning • Probate • Taxation • Litigation • Tax Foreclosure focus on all perimeter points and on the internal network. Host-based controls should focus on critical network hosts, especially those hosting non-public customer data or sensitive corporate data. Host-based controls would include notification of changes to administrative access or even the implementation of software that has the capabil- ity to automatically remove unauthorized accounts. And, please don’t make the common and egregious mistake of installing these systems and not paying attention to them. 2. Implement an application control or whitelisting software product that will allow only “whitelisted” applications on specific systems. This process limits the running of pro- grams (includingmalware) that have not been previously authorized by administrators. 3. Monitor, monitor, and monitor some more. While not a preventative control, monitoring is often ignored because it’s time consuming, expensive, and still hard to detect and qualify anomalous activity. It’s not enough to simply have logging enabled on critical devices, but the capabil- ity to consume log data efficiently by a human and take actionmust exist. This requires a logging system capable of alerting on anomalous activity. Otherwise, the activ- ity will likely go unnoticed due to the extensive amount of logs and lack of time generally apportioned to this important task. 4. Tirelessly patch systems. While this will not help block zero-day attacks, it will help block attacks against known vulnerabilities andmake it harder for a cyber-criminal to gain a foothold. Like most professions, cyber-criminals have a “tool bag” that contains an assortment of tools to help them compromise a system. Patching systems effectively negates part of the cyber-criminal’s tool bag. 5. Block unnecessary egress traffic by default. While in- bound traffic is blocked by default on most firewalls, outbound traffic typically is not. Thus, rules should be implemented that allow only business-related traffic, and disallow all ports/services not normally associated with the corporation’s traffic. This filtering will help block control communication or exfiltration conduits used by cyber criminals. 6. Limit employee participation in cybercriminal advances through relentless training on social engineering tech- niques. Still, many times, the entryway into private networks is employees responding to various social engineering attacks (i.e., phishing, phone calls, etc.). Providing Nebraska Businesses with Fiber Optic Speed • Dedicated Internet Access • Ethernet COMPETING AT THE HIGHEST LEVEL STARTS WITH NEBRASKALINK 888-893-2185 8-893-218 nebraskalink.com
Made with FlippingBook
RkJQdWJsaXNoZXIy OTM0Njg2