WG Top10-Summary WP
WG Top10-Summary WP
The following article is excerpted from "Top 10 Threats to SME Data Security (and what to do about them)," a white paper written by Scott Pinzon, CISSP, of the WatchGuard LiveSecurity team. This summary lists the ten threats and one countermeasure for each. For more details on how we selected the threats we did, what type of network we are addressing, and at least two more countermeasures for each threat, download a free copy of the full white paper at www.watchguard.com/whitepapers.
It's difficult to find reality-based, accurate reporting on what the network security threat really is today, for the average business. Since 1999, the WatchGuard LiveSecurity team has monitored emerging network security threats every day, with a special focus on issues that affect small to medium sized enterprises (SMEs). When we spot an issue that could impact SMEs negatively, we alert our subscribers with email broadcasts. Because our subscribers are time-constrained, overworked IT professionals, we alert only when we know an attack is not merely feasible, but likely. This emphasis on business context and practicality makes our service nearly unique. This approach is constantly refined by input from our tens of thousands of subscribers, field trips to customer sites, focus groups, and "security over beer" bull sessions. The result: this paper lists the top 10 most common vectors of data compromise in our experience as security analysts for SMEs. We also suggest practical techniques and defenses to counter each vector.
WatchGuard Technologies
www.watchguard.com
Social networking sites such as MySpace and Facebook have taken the lead as virtual cesspools of spam, trojans, and spyware. Employees who surf to non-business-related sites end up inviting into the corporate network bot clients, Trojans, spyware, keyloggers, spambots the entire gamut of malware.
www.watchguard.com
page 2
Mitigating reckless web surfing Implement web content filtering. Use web filtering software such as WatchGuard's WebBlocker. Web filtering solutions maintain databases (updated daily) of blocked URLs in scores of categories. More categories means more nuance. Such tools help you enforce your Acceptable Use Policy with technology.
Conclusion
The countermeasures weve suggested above can go a long way in mitigating your risk and protecting your network. But these are only a sampling of the steps that a diligent IT administrator could implement to increase network security. For more practical advice on hardening your network against common problems, download a free copy of the complete Top Ten Security Threats for SMEs (and what to do about them) white paper from the WatchGuard web site. WatchGuard provides extensible threat management (XTM) gateway security appliances that address nine of the ten threats listed herein. (Sadly, our appliances cannot stop your employees from losing portable devices.) We can help you secure your wireless network, check the integrity of clients requesting access to your network, filter spam, proxy web services, minimize insider threats, create VPNs, and much more. For information about WatchGuard security solutions and the protection they provide against botnets and other network threats, visit us at www.watchguard.com or contact your reseller.
2008 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard Logo, Firebox, and LiveSecurity are either registered trademarks or trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. All other trademarks and tradenames are the property of their respective owners. Part. No. WGCE66599_112408
www.watchguard.com
page 3