In the light of recent news reports on aggressive malware #GameOverZeus we thought you may be interested in taking another look at this blog post from one of our Senior Technical Consultants. Also do please ask us about our managed user security training service PhishAware. The service educates your users on exactly what can happen if they click on a dubious link in an email, open an unexpected attachment or enter sensitive information into a web page.
By Malcolm Orekoya, Senior Technical Consultant, Netutils
Views expressed in this post are original thoughts posted by Malcolm Orekoya, Senior Technical Consultant, Netutils. These views are his own and in no way do they represent the views of the company.
The idea that no single solution can suffice on its own to protect enterprise endpoints from the huge number of threats out there is a reasonable one. Therefore most security professionals accept the concept of defence in depth as the best means of protecting endpoints. The key however is to know what to focus on and to make sure your strategy covers all angles. Below are a few areas of focus that you might find useful.
- Understanding the endpoint
There are a couple of aspects of endpoint protection that sometimes get overlooked; the first is the multiple device types and roles that exist within the enterprise network and the second…
View original post 783 more words