Get a Pentest and security assessment of your IT network.

News

Mitigations

Access Management technologies can be used to enforce authorization polices and decisions, especially when existing field devices do not provided sufficient capabilities to support user identification and authentication. Antivirus/antimalware installations should be limited to assets that are not involved in critical or real-time operations. Data Loss Prevention (DLP) technologies can help identify adversarial attempts to exfiltrate operational information, such as engineering plans, trade secrets, recipes, intellectual property, or process telemetry. Encrypt sensitive data-at-rest with strong encryption.”]

Source: https://collaborate.mitre.org/attackics/index.php/Mitigations

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones