X hits on this document

PDF document

Symantec enterpriSe Security - page 85 / 97





85 / 97

Symantec Global internet Security threat report

  • Clicking on links and/or attachments in email messages (or iM messages) may also expose computers to unnecessary risks. Ensure that only applications approved by the organization are deployed on desktop computers.

  • isolate infected computers quickly to prevent the risk of further infection within the organization.

  • train employees to not open attachments unless they are expected and come from a known and trusted source, and to not execute software that is downloaded from the internet unless it has been scanned for viruses.

  • perform a forensic analysis and restore the computers using trusted media.

  • Ensure that emergency response procedures are in place. this includes having a backup-and-restore solution in place in order to restore lost or compromised data in the event of successful attack or catastrophic data loss.

  • Be aware that security risks may be automatically installed on computers with the installation of file- sharing programs, free downloads, and freeware and shareware versions of software.

  • Employ Web-server log monitoring to track if and when complete downloads of company websites, logos, and images are occurring, as this may indicate that someone is attempting to use the legitimate website to create an illegitimate website for phishing.

  • network administrators should review Web proxy logs to determine if any users have visited known blacklisted sites.

Consumer best practices

  • Use an internet security solution that combines antivirus, firewall, intrusion detection, and vulnerability management for maximum protection against malicious code and other threats.

  • Ensure that security patches are up to date and that they are applied to all vulnerable applications in a timely manner.

  • Ensure that passwords are a mix of letters and numbers, and change them often. passwords should not consist of words from the dictionary.

  • never view, open, or execute any email attachment unless the attachment is expected and the purpose of the attachment is known.

  • Keep virus definitions updated regularly. By deploying the latest virus definitions, you can protect your computer against the latest viruses known to be spreading in the wild.

  • routinely check to see if your operating system is vulnerable to threats. A free security scan is available through the Symantec Security Check at www.symantec.com/securitycheck.

  • Get involved by tracking and reporting attack attempts. With Symantec Security Check’s tracing service, users can quickly identify the location of potential hackers and forward the information to the attacker’s iSp or local police.

  • Deploy an antiphishing solution, such as an antiphishing toolbar for Web browsers. Also, never disclose any confidential personal or financial information unless and until you can confirm that any request for such information is legitimate.


Document info
Document views160
Page views160
Page last viewedSun Oct 23 17:01:22 UTC 2016