As we explored in our last article, cybersecurity is an integral part of every business in the current age. There were 1,100,000 cyberattacks in the Philippines in 2019¹ highlighting the importance of cybersecurity.

Here are a few of the things to look out for.

 

System configuration

System configuration control requires businesses to optimize all settings within their network for maximum security, ensure the upkeep of the system via maintenance as this minimizes opportunities for cybercriminals.

As easy as this sounds, breaking down your network into its component parts and fine-tuning each part to be as secure as possible can be a daunting task to undertake for the unconfident or uninitiated.

 

A poorly configured IT system could set you up for failure!

Keeping up with, and applying secure settings requires you to stay vigilant and aware of the latest security protocol! Regular system reviews are essential, be proactive when it comes to maintenance and make regular changes to your settings as your business develops. A poorly configured system could set you up for failure with disastrous consequences.

 

Unauthorized Access

To avoid unauthorised access, managing permissions is of the utmost importance, (by individuals within or outside your organization) to confidential information, system settings and sensitive data. Unauthorised access could result in malware intrusion, data theft/loss, or deliberate or accidental changes to security settings which could present future opportunities for cybercriminals.

 

Poorly maintained software

Patch management is vital to stop hackers. Failing to have the correct security infrastructure and fixes can leave software vulnerabilities exposed for longer- leading to a greater probability of a damaging cyber-attack.

 

Stay secure

Only use the latest supported software

 If you’re using unsupported programs that are no longer being updated and maintained by the vendor then you are leaving your system open to a cyber-attack. Hackers are always looking to exploit problems and vulnerabilities in outdated software.

 

Use a vulnerability scanning tool

Vulnerability scanners are useful tools in identifying weak points across networks, devices, online services and applications. Make regular scans as part of your cybersecurity routine.

 

Disconnect unnecessary peripherals and avoid removable media

Disarm ports to discourage the use of flash drives and other removable media. Such devices are common causes of transmission for malware and stop the use of them wherever possible.

 

Form guidelines for secure software configuration

Create a set of rules on how software programs should be set up to ensure maximum security. Perhaps include a rule that requires unnecessary apps, services and functionality to be removed or disabled, or be sure that said app or service has a multifactor authentication wherever available. And keep a record of any cases that the rules cannot be adhered to.

 

Draw up an inventory of all hardware and software

A good basis to begin configuring your network for maximum security is to create an inventory of all the hardware and software components of your network. Keep record details such as purpose, version, location, and patch status to aid in system maintenance efforts.

 

We’re Blazon

At Blazon Technologies, we specialized in protecting our clients’ network and data, ensuring they can keep running their business even if disaster strikes them.

To find out how we can help you with your security and protection, contact us for more information.

 

Sources

¹https://www.statista.com/statistics/1136151/philippines-number-hacking-incidents-by-region/#:~:text=In%202019%2C%20the%20number%20of,Capital%20Region%20and%20Region%20