A few weeks ago, we conducted a mini-webinar series on Managing Security for eDiscovery with Modus Discovery CIO John Crites. Since then, we’ve shared some of the webinar highlights in our blog. In part 4 of the series, we cover Missing Measures – what is most commonly missing when conducting an information security audit.
The first missing measure is vulnerability testing. A vulnerability test is a sophisticated piece of software that looks into your network environment. It goes through tens of thousands of known ways to break into your servers and will report back to you on all the threats and weaknesses on every server. The software helps you prioritize threats.
Another missing measure is penetration testing. This involves hiring people to break into your company’s network environment to learn your company’s vulnerabilities.
Controlling excessive public IP addresses also can be a missing measure. Every device that is accessible on a public or private Internet has an IP address. A public IP address is like having a published street address. A private IP address is like being in a compound where your address is secret and only people inside that compound know where certain buildings are. Companies should never have anything assigned a public IP address that absolutely doesn’t require it. The only public IP addresses should be for servers that are forced to talk to the public, such as a web server, an email server, or an FTP server.
One more missing measure is intrusion detection and prevention. This is a system that tells your company when an attempted log-in goes against a regular pattern, and will prevent access for an attempt that goes against the normal pattern.
Multifactor authentication is also often missing. Multifactor authentication means having more than one factor when you access your network, such as a password along with an RSA token or a thumb print.
Many of these preventative measures are easy to implement and inexpensive.
In the recorded webinar, you will also learn:
- The difference between different kinds of vulnerability testing and which you should perform on your servers
- The frequency for which you should conduct vulnerability testing
- Examples of intrusion detection, vulnerability testing, penetration testing and more
To watch Part Four of the mini-webinar series, click here now.