Intelligent CISO Issue 21 | Page 68

decrypting myths Having appropriate security configurations requires your applications, servers and databases to be hardened in accordance with best practices. taken when securing your environment. Often, I see environments that’ll leverage the same user account and password across every device in a fleet of endpoints. Sure, to an IT administrator this may be convenient but it’s not necessary and can grant an attacker the ability to pivot across every machine, even if only one of those computers has been breached. From there, attackers can leverage credential dumping programs to get their hands on the passwords or even the Exposed remote desktop services and default ports Any externally facing device that’s connected to the Internet should have layers upon layers of protection to combat attempts to gain access, like a brute force attack. Services like Remote Desktop Protocol, or RDP, a proprietary protocol developed by Microsoft, can provide administrators with an interface to control computers remotely. Increasingly, cybercriminals have taken to leveraging this exposed protocol when it’s not configured properly. hashes themselves and then it’s open season. Avoid password reuse at all costs and disable any accounts that are not required. 68 Administrators should leverage a combination of strong or complex passwords, firewalls and access control Avoid password reuse at all costs and disable any accounts that are not required. lists in order to reduce the likelihood of a compromise. Delayed software patching This, like leaving default credentials on a server or system, may seem like another Issue 21 | www.intelligentciso.com