MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Security Lessons We Learned the Hard Way in 2017

3 Security Lessons We Learned the Hard Way in 2017

2017 was filled with security issues ranging from threats and small attacks to major security breaches. You can learn a lot from the misfortunes of other ill-prepared organizations about how to prepare for and handle cybersecurity issues. This week’s tip is dedicated to learning a bit from some of the security problems that may have flown over your radar last year.

Lesson One: Track Your Data
The Yahoo and Equifax data breaches led to countless individuals losing track of their data and how it’s used online. These breaches made it unbearably clear that even some of the largest organizations in the world aren’t immune to the dangers of the Internet, and even they could become victims if they didn’t pay particularly close attention to their security. In some cases, these breaches remained unannounced for months.

This observation led to the belief that small and medium-sized businesses must be much more careful with their data than they previously had been. If large companies can be toppled by security threats, then so too can small businesses (since they likely have smaller security budgets and less comprehensive solutions put in place). Therefore, a small business should also take as many measures as possible if it should hope to secure its future.

Lesson Two: Patches Are Extremely Important
Patches and security updates are one of the best ways to prevent data breaches. In the Equifax case previously mentioned, it would have been vital. Patches are implemented by developers with the express purpose of resolving holes in their solutions. Yet, 2017 has shown that some companies need to put a higher priority on patching, as many of the issues that 2017 saw could have been prevented with proactive patching.

Everything starts with the developers, though. If the developers don’t issue the patches and updates in the requisite timetable, the problems posed by the threats could have plenty of time to cause as much damage as possible. For example, the bug that allowed the EternalBlue exploit wasn’t patched until a month after the issue had become known. The exploit was then used alongside other threats, like WannaCry and NotPetya, to cause even more trouble for organizations and individuals, alike.

Therefore, we recommend that you apply patches as soon as possible after they are released. We also recommend that you maintain a consistent patching schedule, routinely deploying them as you can. After all, the longer you wait to deploy a patch, the longer you have to become infected by the very bugs that they are designed to fix. Plus, the longer the patch is available, the longer it is available to hackers. These nefarious actors could take it apart and discover what vulnerability is being addressed, affording them time to create code that would negate the effects of the designated patch.

Lesson Three: So Many Ways for Data Theft
Cisco has found that business email and account compromise attacks are five times more profitable than your typical ransomware attacks. In fact, the Federal Bureau of Investigation estimates that BEC attacks have lost businesses over $5 billion. Therefore, your organization needs to take a stand against common security threats. One way you can shore up defenses for your infrastructure is with traditional endpoint security. If you can keep threats from accessing your network in the first place, you’re setting yourself up for success. You can use access controls to ensure that a hacker can’t access your entire infrastructure from a single unsecured endpoint. We also recommend educating your employees through security training so that they are made more aware of their role in network security for your organization.

Don’t let your business fall victim to security threats in 2018. To learn more about network security, reach out to MERIT Solutions at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup google Business Management Productivity Managed IT Services Disaster Recovery Computer Microsoft Outsourced IT Mobile Devices Business Continuity Business IT Support Windows 10 communications VoIP User Tips Hardware IT Services Innovation Productivity Email Cybercrime Mobile Device Management Mobility Efficiency Data Backup Windows Managed IT Server Cybersecurity Ransomware Apps Smartphone Saving Money Data Recovery browser Telephone Systems Save Money Small Business Operating System Virtualization Law Enforcement Internet of Things Hosted Solution Quick Tips Android BYOD Data VPN BDR Money Passwords Information Technology Office 365 Password Holiday Recovery Data Security Chrome Microsoft Office Google Drive Hacking Cloud Computing IT Support Avoiding Downtime Alert Health Facebook Work/Life Balance Miscellaneous Government Managed Service Provider Computers Phishing Gadgets Best Practice Social Media Budget Smartphones Data Management Wireless upgrade Social Risk Management App Unsupported Software Communication Collaboration Automation Flexibility Telephony User Error Shortcut Windows 10 Wi-Fi Firewall Applications Private Cloud Office tips History Application Vulnerability Current Events Audit Proactive IT Workplace Tips Managed IT Services Personal Information The Internet of Things Data Breach Politics Social Engineering Two-factor Authentication USB Save Time search Wireless Technology Identity Theft Artificial Intelligence Redundancy iPhone Blockchain Commerce Mobile Computing Transportation Cost Management Cortana Robot Gmail SaaS Samsung End of Support Antivirus Remote Computing Content Filtering Update Spam Battery HaaS Excel IT solutions Data Storage DDoS Compliance Humor Disaster OneNote Automobile Television Employer-Employee Relationship Project Management Streaming Media Saving Time Apple Cleaning Network Sports Data Loss Office Marketing Tech Support Computer Care WiFi Phone System Google Docs Going Green Hacker Legal Internet Exlporer Solid State Drive Bandwidth Users Encryption Data Protection eWaste Analytics Professional Services IT budget Running Cable Keyboard Server 2008 Instant Messaging File Sharing IT Management Maintenance Computer Accessories Windows 10s Ali Rowghani Worker Commute Big Data Travel Trending Mobile Device PDF Nanotechnology Managing Stress Storage Credit Cards WIndows Server 2008 Device Security Hard Disk Drive Books Scalability Tablets Identities Text Messaging Root Cause Analysis Hiring/Firing server installation dvd "cannot install required files" Education Router FAQ Patch Management Devices Vendor Management stock How To NFL Augmented Reality Business Intelligence Benefits Touchscreen Lifestyle Charger Outlook Spyware tweet Laptop Uninterrupted Power Supply Word Unified Threat Management Managed IT Service calculator Legislation Wireless Charging Fraud Training iOS Twitter Entertainment Electronic Medical Records Touchpad control Windows Ink Upgrades Reputation Point of Sale Comparison Evernote Regulation Edge Company Culture Advertising Computer Fan WSJ HIPAA Exchange Black Market Google Maps Consultant Specifications Screen Mirroring Distributed Denial of Service Smart Technology altivista Avoid Downtime Networking Sync Ciminal Value Dark Web Data storage Meetings SBS Shadow IT Software as a Service Sales Cast Administration Emails compaq Document Management Chromecast Workers Adobe Experience Settings Wearable Technology Retail Colocation hp Video Games Updates Licensing MSP Hard Drives WannaCry domain Virtual Reality Files Lithium-ion battery Conferencing HBO Scam Webinar Administrator Music Microsoft Word Mobile intranet remote Microsoft Excel Gifts Employer Employee Relationship Relocation IT solutions Yahoo Access Thank You Congratulations CrashOverride Safety Emergency Cache Worker Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...