A recap of our top 2020 cybersecurity articles

A recap of our top 2020 cybersecurity articles

August 17, 2020 

 

 

2020 has been a challenging year both generally and tech-wise, especially in light of the ongoing Coronavirus, which impacted the way organizations and businesses operate. Our cybersecurity experts published numerous articles in our blog on the biggest and most exciting trends of this year. Here’s the recap of the 10 top posts:

 

Coronavirus Implications for Organizations and Zero Trust Approach

Since the outbreak of the Coronavirus, organizations across all the industries focus on ensuring business continuity and creating mitigation plans, fearing that the inability to deliver services will lead to a major blocker. One of the best solutions for this is the Zero Trust approach. This approach emphasizes tighter security, limited access, and a stricter need-to-know basis. 

 

Work securely with Microsoft Teams – Remote work during Coronavirus

The ongoing Covid-19 pandemic has introduced new risks to the world’s economy. In order to maintain their business continuity, organizations were forced to find new solutions, such as allowing for remote work, while ensuring confidentiality, integrity, and availability. For this purpose, many organizations have chosen to work with Microsoft Teams. Read more on Microsoft Teams recommendations for this period.

 

Why Endpoint Security is Extremely Significant for Your Organization

Endpoint is primarily an end-user system or device which is connected with a network of sorts. Attacks on endpoints, which are the last hurdle for the most common breaches, have become more common and sophisticated. We believe that strong and secure endpoint security reduces the overall risk of full network compromise. Read more on our recommendations for protecting your corporate endpoint and associated networks.

 

Email Advanced Anti Impersonation & Spoofing Defenses

One of the leading mechanisms for protection from email spoofing is the Sender Policy Framework (SPF) mechanism. As such, there are techniques that are favored by attackers to bypass SPF limitations, such as changing the TXT records in the DNS server. Discover the top anti-spoofing mechanisms.

 

Vulnerability Management – Essential aspect to prevent cyber attacks

Unpatched vulnerabilities are one of the major reasons why organizations face some of the most impactful cyber-attacks and breaches, most of which could be avoided effortlessly. One of the most crucial controls that organizations should emphasize on is Continuous Vulnerability Management (CVM). Learn more about the recommended practices to follow the CVM program.

 

Quick Assist – A Concealed Threat

Quick Assist is a remote access tool integrated into Windows 10 and later, which allows a user to take control of another client remotely and to temporarily view or control another node, connected over a network or over the wire (internet). There are several known risks and vulnerabilities associated with the Quick Assist. Find out what steps your organization can take to mitigate remote access attacks.

 

Threat hunting 101

Threat hunting is a preemptive cyber defense process and activity aiming to identify and remediate sophisticated threats that can evade existing defense mechanisms. Discover our Threat Hunting abilities by clicking here.

 

Credentials Dumping

Credentials dumping is a process or technique which is used by cybercriminals and bad actors to extract account credentials information from an underlying operating system, files, and respective software. Click here to learn more about credential dumping and mitigation methods.

 

Top Attack Vectors – 2020

Our TSOC analysis indicates that while the top attack vectors for 2020 haven’t changed from 2019, they have become much more alarming. Learn more about what can be done to mitigate these risks.

 

A Notion Behind the Password Age

Multiple studies have emphasized that a short password age is not needed and is possibly less secure. Until organizations implement advanced authentication and password creation techniques, long password age with long password length can mitigate some of the related risks. Read more on password expiration issues and what your organization can do to find solutions for these issues.

 

 

Visit our blog or Follow Us on Facebook Page for the latest news and insights on cybersecurity.

Stay Safe with TrustNet!