Home » Computer & Software » Networking » Six Real Security Threats IT Professionals May Face in 2013
Ihren XING-Kontakten zeigen

Six Real Security Threats IT Professionals May Face in 2013

AUSTIN, TX — (Marketwired) — 05/01/13 — IT Security can overwhelm even the most seasoned security expert when headline-grabbing threats like Spamhaus DDoS are brought to the forefront by media. SolarWinds (NYSE: SWI), a leading provider of powerful and affordable , today outlined six security threats that many IT professionals never think they-ll face (until they do) and provided best practices to help prevent and manage unwanted threats from becoming a reality.

While security experts may know better, many IT pros might think: “My organization is not a high-value target. What do we have that anyone would want?” In reality, the answer is more than they would guess. Sensitive and personal information like credit card and social security numbers, patient records, to name a few. Plus, with direct access to the breached network, they could do damage to other organization-s networks.

Aside from organizations placing a great deal of trust in their employees and believing that their policies are adequate, what might take IT pros by surprise is simple employee ignorance. Due to the proliferation of personal mobile devices, employees are taking their work home with them more often. This has made it extremely difficult to keep track of who and what is connecting to the network, resulting in less control and increased security risks.

DoS and DDoS attacks are among the inventive hacking practices on the rise that could bring down business critical services, inhibiting user access and business continuity. IT pros may get caught off guard with this type of attack since, in many cases, it-s the result of someone out to wreak some havoc.

As organizations grow and bandwidth for time and resources are taxed, it-s easy for over-extended IT pros to overlook existing rules and inadvertently open security holes simply by not knowing the full impact of their changes, or for under-experienced IT pros to not know what to monitor and what tools to use.

Culprits masquerading as a trustworthy entity attempt to acquire usernames, passwords, credit card details, and account information to gain access to a system through email or via instant messaging. Organizations which are most affected believe that their controls are good enough, relying on junk mail as a catch-all or their users to know when and when not to open suspicious email.

For many, if not most, organizations, third-party applications like Java and Flash are critical infrastructures required to use a large number of business applications. Organizations are prime targets for infestations when IT pros assume that the most recent application version is security-proof, they are not up-to-date on their patches, or when they don-t have full account of all the applications installed by end users.

It-s easy to get caught up in preventing what-if scenarios, but it-s most important to remember Security 101 — the basics of what every IT pro should consider when securing their network, including:

Define and establish security policies and rules.

Document your network, policies and access.

Continuously track and monitor activity and behavior with real-time alerts and reporting.

Automate with software tools where you can.

Have an incident response plan including when to notify corporate legal, PR and customers/clients.

Regroup after an incident to ensure appropriate actions have been taken to mitigate risk in the future.

Use operational management tools to gain insight into suspicious behavior.

“In the pursuit of defending against the latest and most sophisticated attacks, we find many IT professionals doing so at the expense of fundamental security controls. IT security is not always about over-complicated issues or threats, but doing the basic steps to ensure you have a secure foundation in place,” said Javvad Malik, senior analyst, 451 Research.

For IT pros that don-t spend their day thinking about security yet need the tools to tackle everyday operational security challenges, SolarWinds offers IT pros a number of powerful, easy-to-use and affordable products with security functionality built-in. From (SIEM) to firewall and patch management and more, IT pros can assess their environment and deploy SolarWinds- IT management products on a need-by-need basis to achieve end-to-end security visibility.

– SIEM; endpoint data loss monitoring

– Firewall security management

– Endpoint vulnerability management

– User and device tracking

SolarWinds (NYSE: SWI) provides powerful and affordable IT management software to customers worldwide from Fortune 500 enterprises to small businesses. In all of our market areas, our approach is consistent. We focus exclusively on IT Pros and strive to eliminate the complexity that they have been forced to accept from traditional enterprise software vendors. SolarWinds delivers on this commitment with unexpected simplicity through products that are easy to find, buy, use and maintain while providing the power to address any IT management problem on any scale. Our solutions are rooted in our deep connection to our user base, which interacts in our online community, , to solve problems, share technology and best practices, and directly participate in our product development process. Learn more today at .

SolarWinds, SolarWinds.com and thwack are registered trademarks of SolarWinds. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies.

MEDIA CONTACTS:
Grace Pai-Leonard
Text100
212.871.5194

Jodi Bart
SolarWinds
512.657.8297

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop