Posts

Showing posts with the label cyber security

Effective Vulnerability Management

Vulnerability Management forms the core of cyber security be it infra or applications. Infrastructure layer vulnerability creates more challenges as it is connected to more internal networks and forms a backbone of organization business sustenance. While all organizations do vulnerability management, some internal with their own team, some through third party vendors, but still during attacks or security breaches, it is found more and more systems are prone to cyber attacks.  There are multiple solutions in the market from OEM to open source who claims to provide the hawk eye view of business security challenges, however still business owners finds it difficult to perform effective vulnerability management. We are listing here possible measures to ensure vulnerability management program is effective Discovery of Assets : - This forms the first steps and core of this program. If the assets are not tagged or discovered, then entire exercise goes in wrong direction. Any

How to approach cyber security

Ever since wanna cry and petya Ransomware spreads have started, cyber security has become a major topic to discuss on. Effective Cybersecurity approach can help gain maximum out of cyber security program. Few steps can help us make a good start with respect to infrastructure 1- start with identify objectives of cyber security. 2- vulnerability assessments of infra is must 3- malware scanning should be a part of every vulnerability assessments 4- policy testing should be done to identify organisation Security violations as password violations 5- Disabled users and guest accounts should be checked​ 6- Admin passwords, blank passwords , root accounts, privilege levels should be verified 7- Business needs to be tested for escalation on user privileges 8- Find out most critical cves and newly discovered CVS