Remember, this is NOT a replacement for best practices or existing protection.
Stolen enterprise user credentials are all the rage among hackers these days, but spotting the bad guys among legitimate users logging in remotely can be difficult
FireEye recommends several best practices for thwarting remote access hacks in addition to deploying GeoLogonalyzer,
among other steps.
Pointers that can help you in your decision making
https://www.darkreading.com/analytics/fireeye-offers-free-tool-to-detect-malicious-remote-logins/d/d-id/1331923
Stolen enterprise user credentials are all the rage among hackers these days, but spotting the bad guys among legitimate users logging in remotely can be difficult
FireEye recommends several best practices for thwarting remote access hacks in addition to deploying GeoLogonalyzer,
- Including limiting remote access from the Internet to sensitive data
- Instituting multi factor authentication using one-time tokens
- Whitelisting legit IP address ranges for remote access users,
among other steps.
Pointers that can help you in your decision making
- Three things to know at any given point of time:
- What are you trying to protect
- What is the cost of failure (to protect)
- Who is is your enymy
- What is the simplest and transparent way to protect
- What is the cost (money / time / resources)
- How do I monitor and generate valuable metrics
https://www.darkreading.com/analytics/fireeye-offers-free-tool-to-detect-malicious-remote-logins/d/d-id/1331923
No comments:
Post a Comment