What Do the Recent Cyberattacks on Big Brands Have to Tell Us?

Weaknesses

  • Establish the principle of least privilege-users must access only what is necessary to carry out their work
  • Make users aware not to open emails from unknown sources, and be wary of attachments from known sources
  • Have a strict policy of using third-party machines and remote access to the network-ideally, these networks should be segregated from the corporate environment by a next-generation firewall
  • Perform continuous monitoring of IT and TA security tools to continuously improve controls

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store