The portal provides five tips to help administrators keep their
1. Conduct a thorough software inventory. What did Equifax learn? The company likely knew about the vulnerability in Apache Struts 2, but it did not track software versions or monitor its health (the company’s former CEO previously stated this). It is quite common for companies to install software that is up-to-date at some point in time, but then fail to monitor library versions or fail to update components. Apache Struts 2 illustrates the importance of this process. At the time the vulnerability was disclosed, the Struts 2 library—files containing archives critical to the program’s operation—consisted of 50 versions, with most of them (58%) vulnerable to hacker attacks, according to the Veracode report.
Experts advise companies to use special detection new zealand whatsapp data to quickly eliminate vulnerabilities. “An organization may know about a Struts vulnerability, but that’s not enough – it needs to check all segments of the network. Many companies don’t do this, so there are many weak points in the networks that we don’t know about or won’t know about soon,” said Jimmy Graham, director of enterprise infrastructure vulnerability research at Qualys.
2. Monitor the security status of auxiliary devices. Typically, when it comes to the security of the organization's perimeter, servers, software, network, storage systems, and other objects are mentioned, but auxiliary devices that are not directly connected to the enterprise's IT infrastructure are not always taken into account. These include a large number of IoT gadgets - from network routers used in home offices to digital video recorders for conference calls.
IT infrastructures up to date
-
- Posts: 533
- Joined: Mon Dec 23, 2024 3:15 am