0850 800 1483
A document for cybersecurity professionals, this e-book provides guidance on protecting against common techniques used by hackers for first-access, reconnaissance, privilege escalation, and mission targets, while providing comprehensive defense advice for each tactic. It also serves as a valuable resource for businesses to prepare for such cyber threats.
Patch and strengthen detected vulnerabilities to proactively identify and verify exposed applications and services.
Configure exposed applications and services that allow single-factor authentication to support multi-factor authentication.
Verify that backups for domain controllers and critical assets are available and protected from unauthorized access or modification.
By enforcing IT and OT segmentation, block the ability of hackers to return to mission-critical OT assets using compromised accounts.
Place these interfaces in isolated virtual local area networks (VLANs) to isolate and restrict access to management interfaces.
Configure the Windows Firewall policy to restrict the scope of allowed communication between endpoints within an environment.