How to Reduce Malware-Induced Security Breaches
(Steve Dispensa, eWeek) Malware has caused the industry to rethink its security best practices, introducing tools such as transaction verification to guard against real-time, man-in-the-middle attacks. Out-of-band authentication mechanisms are growing rapidly in popularity. While it is certain that malware will continue to evolve, Knowledge Center contributor Steve Dispensa offers four simple steps you can take to significantly reduce your malware-induced security breach exposure.
In a recent survey of IT professionals, over 32 percent felt that malware installed on PCs will pose the greatest external threat to IT security over the next 12 months. Over 16 percent indicated that malware on mobile devices presented the greatest threat. In total, malware running on PCs and mobile devices was ranked the top threat for 2010 by nearly 50 percent of respondents.
Fortunately, there are four concrete steps you can take to prevent malware threats in your organization:
Leave a comment
Mail Server Operating System Poll
Get IP status, owner and location, obtain its corresponding hostname or check specific ports.
Open Relay Test
Test if your mail server is an open relay for spammers.
Check if your IP is listed in DNS based email blacklists (DNSBL)