Best Security Approach: Layers and Trained Staff

 
 
By Karen A. Frenkel  |  Posted 09-18-2017 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Best Security Approach: Layers and Trained Staff
    Next

    Best Security Approach: Layers and Trained Staff

    People are a key part of any security program, which includes hiring and retaining skilled security pros and using technology to maximize their effectiveness.
  • Previous
    Phishing Attacks Worldwide
    Next

    Phishing Attacks Worldwide

    Phishing attacks were responsible for 73% of malware delivered to organizations. Nearly 30% of attacks detected worldwide targeted end-user technologies, including Adobe products, Java and Internet Explorer.
  • Previous
    Technologies Most Targeted on Users' Computers
    Next

    Technologies Most Targeted on Users' Computers

    The three technologies on end-user computers that were targeted the most were Adobe Flash Player, Microsoft Internet Explorer and Microsoft Silverlight.
  • Previous
    Steady Decline in Exploit Kit Activity
    Next

    Steady Decline in Exploit Kit Activity

    13% of exploit kit activity occurred during the third quarter of 2016, reflecting a steady decline in such activity throughout that year.
  • Previous
    Top Sectors Where Ransomware  Was Found
    Next

    Top Sectors Where Ransomware Was Found

    Business and professional services: 28%, Government: 19%, Healthcare: 15%, Retail: 15%
  • Previous
    Finance Industry Under Fire Everywhere
    Next

    Finance Industry Under Fire Everywhere

    The finance industry was the only one to appear in the top three most-attacked industries in all six geographic regions. Manufacturing followed, appearing in five of the six regions. No other sector appeared more than twice.
  • Previous
    Particular Passwords
    Next

    Particular Passwords

    25 passwords accounted for 33% of all authentication attempts against NTT Security Honeypots.
  • Previous
    DDoS Attacks in Asia and Australia
    Next

    DDoS Attacks in Asia and Australia

    DDoS attacks accounted for less than 6% of all attacks worldwide, but they made up 16% of attacks in Asia and 23% of attacks in Australia.
  • Previous
    Outbound Traffic in the Americas
    Next

    Outbound Traffic in the Americas

    Companies in the Americas accounted for 99% of outbound peer-to-peer traffic and included the applications BitTorrent, Hola VPN and Groove Virtual Office.
  • Previous
    Recommendation: Update and Patch
    Next

    Recommendation: Update and Patch

    Keep all devices updated. Without updates and patches, devices may be insecure, and attackers can take advantage of that.
  • Previous
    Recommendation: Prepare and Educate
    Next

    Recommendation: Prepare and Educate

    Prepare for phishing attacks and educate employees. Sent through emails, text and phone calls, these attacks try to trick people into clicking on phony websites or providing information to impersonators.
  • Previous
    Recommendation: Manage Passwords
    Next

    Recommendation: Manage Passwords

    Use a strong, unique password for each account. Remembering all of them is virtually impossible, but password manager utilities or other automated aids can store them securely.
 

A new report, the "2017 Global Threat Intelligence Report" from NTT Communications, calls for organizations to acknowledge people as a key part of any security program. That includes hiring and retaining skilled security professionals and using technology and automation to maximize their effectiveness. The report also calls for security and technical training for all personnel involved in the organization's business. "The biggest security priority … should be providing a comprehensive security management, policy and governance practice, which can help manage these competing challenges. Security is best approached in layers, and an important layer is actively managing security as an ongoing daily practice as part of the business," said Kazuhiro Gomi, president and CEO of NTT America. The report recommends overarching principles that leaders can adopt, and includes key statistical findings based on the company's analysis of security event data during the past year from clients' networks across six continents. The company identified 6 billion attempted attacks of "nearly every type imaginable."

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register