Page 50 - Cyber Defense eMagazine March 2024
P. 50

•  Implement a vulnerability management process. Security teams must ensure that all software
                   being used is updated. A notable way that threat actors move laterally within a network is by
                   exploiting known vulnerabilities in existing software. Organizations can significantly reduce their
                   risk  by  implementing a  vulnerability  management  process  that  is  designed  to  regularly  patch
                   software,  operating  system  and  third-party  vulnerabilities.  Removing  this  “easy  button”  for
                   attackers makes their job much harder and can prevent many common attacks from succeeding.

               •  Hire a managed service provider. Maintaining security effectively is a service. Managed service
                   providers (MSPs) are valuable resources who can provide comprehensive, dedicated services to
                   significantly reduce the security risks that companies face. They can manage the appropriate
                   security  configuration  and  operation  of  protected  devices.  The  work  of  MSPs  is  critical  for
                   protecting end users.


               •  Consider  an  MDR  service.  As  cyberthreats  have  grown  increasingly  complex,  many
                   organizations – especially small and midmarket companies – have come to realize that they don’t
                   have  the  resources  or  expertise  to  defend  themselves  on  their  own.  As  a  result,  managed
                   detection and response (MDR) services have become increasingly popular. Consider employing
                   an  MDR  service  to  help  with  providing  24/7  threat  detection  and  response  services.  If  your
                   company isn’t ready to go the MDR route, you should at least consider using a security solution
                   that includes advanced security services – such as services that classify 100% of the executables,
                   for instance – with its usage license.



            An important concept to understand is that effective security requires more than a technology solution;
            what is needed is a combination of technology and security services managed by a team of experts.
            Organizations shouldn’t simply deploy a security solution, they need to manage that security solution and
            put  people  in  place  to  analyze  the  activity  and  anomalies  that  their  security  tools  uncover.  If  your
            organization doesn't have a security operations team, it's probably worth subscribing to an MDR service
            instead  of  trying  to  do  the  work  by  yourself.  Because ultimately,  effective security  requires  constant
            monitoring. With the right people, products and processes, you can protect your endpoints and your entire
            network.



            About Guillermo Gómez


            Guillermo Gómez, Market Owner for Endpoint Security, is responsible for leading
            the evolution and success of the Endpoint product line at WatchGuard. With 25
            years of experience in the Endpoint Security space. He started his career as an
            engineer,  though  he  moved  to  management  positions  to  initially  lead  Product
            Development  and,  finally,  to  be  responsible  for  Product  Management,  Product
            Development, IT, and Support areas at Panda Security.







            Cyber Defense eMagazine – March 2024 Edition                                                                                                                                                                                                          50
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   45   46   47   48   49   50   51   52   53   54   55