Page 21 - Cyber Warnings
P. 21







 Settings for Attachments, Cryptography, Digital signatures, Junk email, Information
Rights Management and Protected view

Similarly, fine grain security settings are available for Excel, Word, PowerPoint and Office, all
serving to mitigate vulnerabilities within the application that could be exploited by an attacker,
overall bolstering Ransomware defenses.

Likewise for contemporary browsers like Chrome, Firefox and Internet Explorer, antiphishing
controls should be enabled alongside other built-in security measures that are often disabled by
default.



Key Questions Regarding Desktop Application Hardening

 Which settings need to be set and which are optional?
 What are the implications in terms of user experience and application function if security
settings are enabled?
 How do you actually apply the necessary secure configuration, and how do you do it in
bulk for your entire IT estate?



Help is at Hand: 5 Steps to Mitigate the Ransomware Threat

1. Hardening Homework: While organizations like The Center for Internet Security (CIS),
NIST and the National Vulnerability Database provide system hardening guidance, you’ll
still need to work out what is right for your users
2. Leverage Automation: Most scanners and FIM solutions will provide fast, automated
reports to establish where vulnerabilities exist, while the best options will also provide
remediation advice, or better still, Group Policy or Puppet templates to automatically
apply a hardened configuration to Workstations and their Applications.
3. Change Control: You’ll also need to make sure that patching is up to date as a further
means of closing of exploitable vulnerabilities, but think about getting more structured.
Change control is a key security best practice when done right, makes a cyber attack
much easier to detect and head-off before lasting damage is done
4. Ransomware: If you can’t stop, make sure you can spot it. There still is no such thing as
100% security, so while your emphasis will be on prevention, accept that detection of a
breach is going to be a necessary contingency. This is where FIM and SIEM systems
also enhance security, by analyzing system activity for signs of suspicious behavior.
5. Rip it up and start again: And if you do fall victim to Ransomware, think how grateful you
will be when you can simply scrap a Desktop, re-image it and recover all data, all in its
useable, non-encrypted state. Goes without saying that backups are critical, but make
sure the restore process works by testing regularly.





21 Cyber Warnings E-Magazine – June 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   16   17   18   19   20   21   22   23   24   25   26