Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Security Lessons We Learned the Hard Way in 2017

3 Security Lessons We Learned the Hard Way in 2017

2017 was filled with security issues ranging from threats and small attacks to major security breaches. You can learn a lot from the misfortunes of other ill-prepared organizations about how to prepare for and handle cybersecurity issues. This week’s tip is dedicated to learning a bit from some of the security problems that may have flown over your radar last year.

Lesson One: Track Your Data
The Yahoo and Equifax data breaches led to countless individuals losing track of their data and how it’s used online. These breaches made it unbearably clear that even some of the largest organizations in the world aren’t immune to the dangers of the Internet, and even they could become victims if they didn’t pay particularly close attention to their security. In some cases, these breaches remained unannounced for months.

This observation led to the belief that small and medium-sized businesses must be much more careful with their data than they previously had been. If large companies can be toppled by security threats, then so too can small businesses (since they likely have smaller security budgets and less comprehensive solutions put in place). Therefore, a small business should also take as many measures as possible if it should hope to secure its future.

Lesson Two: Patches Are Extremely Important
Patches and security updates are one of the best ways to prevent data breaches. In the Equifax case previously mentioned, it would have been vital. Patches are implemented by developers with the express purpose of resolving holes in their solutions. Yet, 2017 has shown that some companies need to put a higher priority on patching, as many of the issues that 2017 saw could have been prevented with proactive patching.

Everything starts with the developers, though. If the developers don’t issue the patches and updates in the requisite timetable, the problems posed by the threats could have plenty of time to cause as much damage as possible. For example, the bug that allowed the EternalBlue exploit wasn’t patched until a month after the issue had become known. The exploit was then used alongside other threats, like WannaCry and NotPetya, to cause even more trouble for organizations and individuals, alike.

Therefore, we recommend that you apply patches as soon as possible after they are released. We also recommend that you maintain a consistent patching schedule, routinely deploying them as you can. After all, the longer you wait to deploy a patch, the longer you have to become infected by the very bugs that they are designed to fix. Plus, the longer the patch is available, the longer it is available to hackers. These nefarious actors could take it apart and discover what vulnerability is being addressed, affording them time to create code that would negate the effects of the designated patch.

Lesson Three: So Many Ways for Data Theft
Cisco has found that business email and account compromise attacks are five times more profitable than your typical ransomware attacks. In fact, the Federal Bureau of Investigation estimates that BEC attacks have lost businesses over $5 billion. Therefore, your organization needs to take a stand against common security threats. One way you can shore up defenses for your infrastructure is with traditional endpoint security. If you can keep threats from accessing your network in the first place, you’re setting yourself up for success. You can use access controls to ensure that a hacker can’t access your entire infrastructure from a single unsecured endpoint. We also recommend educating your employees through security training so that they are made more aware of their role in network security for your organization.

Don’t let your business fall victim to security threats in 2018. To learn more about network security, reach out to Eclipse Integrated Systems at 800-340-0505.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 May 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Internet Business Computing Malware Network Security Software Google Business Management Microsoft Windows 10 Computer Hosted Solutions Innovation User Tips Backup Productivity Productivity Business Windows Apps Cybersecurity Email Mobile Devices Efficiency Cybercrime Hardware Smartphone Operating System Virtualization Saving Money Law Enforcement Disaster Recovery Managed IT Services Browser Data Security Data Backup Ransomware Android Tech Term Smartphones Small Business Business Continuity IT Support VoIP Internet of Things Mobile Device Management Telephone Systems Miscellaneous Passwords Money Holiday Mobility Server Microsoft Office Office 365 Data Recovery Wireless Quick Tips communications Chrome Phishing Health Wi-Fi Cloud Computing Information Technology Unsupported Software IT Support Google Drive Cost Management Outsourced IT Update Application Communication Collaboration Password Best Practice BDR Risk Management Vulnerability IT Services Workplace Tips Social Gadgets App Government USB Alert Antivirus Managed Service Provider Upgrade Data Management Politics Facebook Managed IT Two-factor Authentication Data Current Events Computers Spam Windows 10 Shortcut User Error Hacking Identity Theft Save Money Employer-Employee Relationship Work/Life Balance Office tips Social Media Computer Care Artificial Intelligence Hosted Solution Mobile Computing Legal DDoS Search Mobile Security The Internet of Things Blockchain Google Docs Flexibility Office Network Router Cleaning History End of Support Data Protection Maintenance Sports Private Cloud Battery HaaS Save Time Recovery Going Green Automation Apple Commerce Personal Information Tech Support Devices eWaste Cortana Automobile Transportation WiFi Proactive IT Internet Exlporer Streaming Media Wireless Technology Social Engineering Bandwidth Data Storage Wireless Charging Fraud Television OneNote Encryption Samsung VPN Patch Management Humor Telephony Managed IT Services Remote Computing Users Audit iPhone Meetings Excel Project Management Computer Fan Google Maps Video Games Smart Technology Avoiding Downtime Chromecast App store Retail BYOD Emails Sync Safety Threat Workers IT budget WannaCry Data Loss Trending Conferencing Webinar Lithium-ion battery Updates Bluetooth Virtual Reality Distributed Denial of Service Entertainment Identity Gifts HBO IT solutions Adobe Data storage Microsoft Word Marketing Identities Fax Server Nanotechnology Microsoft Excel Scalability Scam Education Administrator Data Privacy Credit Cards Mobile Device Windows 10s Applications Language Root Cause Analysis File Sharing How To Employer Employee Relationship Experience Gmail Access Hard Drive IT Management Solid State Drive Licensing Wearable Technology Device Security Augmented Reality Storage Computer Accessories Point of Sale Advertising Phone System Chromebook FAQ SaaS IT Solutions Hard Disk Drive Travel Hacker Files Virus Reputation Music Printing Charger Unified Threat Management Tablets Keyboard Laptop Running Cable Spyware Proactive SharePoint Legislation Black Market Vendor Management Analytics Robot Google Assistant Upgrades WIndows Server 2008 NFL Touchpad Websites Comparison PDF Big Data Value Screen Mirroring Data Breach Consultant Edge iOS Word Hiring/Firing Data Theft Teamwork Specifications Instant Messaging Training Worker Commute Touchscreen Outlook Text Messaging Books Evernote Ciminal Windows Ink Benefits Operating Sysytem Uninterrupted Power Supply Budget Computing Settings Sales Managing Stress Company Culture Cast Electronic Medical Records Internet Explorer Networking Cache Remote Monitoring Emergency PowerPoint Disaster Monitors Connectivity Worker CrashOverride Relocation Twitter

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login