Client Login

Contact Us

  • Call Now:877-368-9400
  • Email Adress:support@technicallink.net
  • Address Info:8335 Winnetka Ave, Unit 176, Winnetka CA. 91306

Close Support

Support

Anatomy of an Attack Part 1

Anatomy of an Attack Part 1

In Part one of this series Anatomy of an Attack we will look at the prevention management or the pre-attack phase. This phase we will discuss things you can do to prevent an attack. I would always prefer to be on the offensive when it comes to security instead of reacting to problem.

McAfee researchers have identified four phases of every malicious attack. Over the next few weeks, we will share tips for protecting your business regardless of the phase of attack you may find yourself responding to.

Before we begin discussing the phases of attack, here are some things to consider when architecting your attack prevention strategy:

  • Maintain real-time visibility into the security health of your endpoints – Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. This can be a smart phone, computer, tablet or  server.
  • Prioritize your response to risks – Real-time threat updates enable you to respond according to threat relevance, putting the proper type of countermeasures in place at the right time. Having a security solution in place like McAfee can give you the real-time protection that you need. We recommend having the following pieces in place for you threat prevention. A firewall that will block unwanted traffic, virus protection that will scan files and on your device looking for problems and finally a browser protection.

Many of us forget that the mobile phone or tablet you are using contains data you use for your business everyday. Making sure you mobile security isn’t over looked is important to protecting business.  In today’s market a hacked or stolen smart phone could put your business at risk. Also it is a good idea to discuss what type of access someone will have with those devices when on your network.

In part 2 of this series we will look at the ways you receive that initial contact. We will look at ways to identify these potential threats to keep you and your business safe. If you have questions or comments before then please post them here.