Doug Bedell — June 12, 2017, 10:26 am

Pluck Your ‘Low-Hanging’ Cyber Security Fruit – Could Be Enough


For a good overview on how to confront the security needs of your organization, Government Security News offers Katherine Teitler’s “5 Ways to Find the Low-Hanging Fruit on Your Network.”

“Though securing everything which needs securing — hardware, software, applications, data, people — is by no means a light lift,” Ms.Teitler writes, the security team’s ability to focus on eliminating low-hanging fruit will raise the ‘cost’ of an attack for cybercriminals. In many cases, this means your adversary will turn his attention elsewhere. If your company is a high-value, singled-out target, erecting better barriers means the attacker has to elevate his game, and you’ll have a better chance of identifying an attack earlier in the cycle…so long as you don’t “set and forget.”

Yes, whatever you do in cyber security terms, keep it current.

No Comments »

RSS feed for Comments on this post.

No comments yet.

Leave a comment

Plain text comments only.