With Managed Services, Respond Quickly to New Threats

  Posted by Elizabeth Goodman in IT Solutions Tuesday, 28 March 2017 00:00

Cyber threats can catch people by surprise, necessitating a quick and thoughtful response, even before the full story with all its details emerge.

A recent example is Cloudbleed, a software bug in Cloudflare that led to alarming data leaks. Sensitive information, including log-in credentials and private messages, got exposed publicly and cached by search engines.

The coding error that led to this data breach has since been fixed and a cleanup undertaken to try to remove leaked data from public view. But the extent of the exposed data isn't yet clear. Cloudflare offers various web services, including website protection, to numerous companies, including Uber and OKCupid. We don't yet know how Cloudbleed will affect people.

Are you prepared to respond quickly?

When a new cyber security threat emerges, you need to immediately act. What are some of the steps you may need to take?

  • Changing login credentials. With Cloudbleed, for example, it would be important to quickly change passwords and other credentials for potentially affected sites and perhaps make inquiries to Cloudflare about the steps they're taking to resolve the problem.
  • Double-checking and strengthening your user authentication measures. How can you more reliably distinguish between authorized and unauthorized users?
  • Performing a software update. If a new version of a software gets released and contains a patch for a security vulnerability, you need to quickly perform the update.
  • Taking any other steps needed to correct the problem. Sometimes it's your own error or vulnerability that led to a data breach; other times, the problem stemmed from a vendor. You may need to do anything from rewriting your own code to discontinuing your relationship with a particular vendor.
  • Monitoring possible repercussions. Compromised data may wind up getting used against you, sometimes within hours of a data breach and other times within months or years. You need to remain aware of the potential repercussions and monitor the situation. (In general, 24/7 monitoring of your systems is an essential defense against cyber attacks.)
  • Alerting people to the situation. If your business website uses Cloudflare, for example, how would you let customers know about the situation and what you're doing to address it? Without alarming people needlessly, discuss the problem and highlight your commitment to fixing it.

 

Handling all of this on your own is daunting. However, if you work with a managed services provider (MSP), you'll benefit from experienced IT professionals assisting you round-the-clock. Your MSP will act quickly and thoughtfully on your behalf while keeping you informed about the situation and receiving your feedback and insights. Please contact us for more information about our managed services.

Categories

Archive

Tags

3d tv 360 kinect Advanced IT adzzoo aeropeek airlines Amazon Cloud Player american flag antispam antivirus apple pie applie ipad apps ascii audit audit,business audits audit report automatic updates avg avg updates back to school backup beef and cabbage beethoven Block Malicious Traffic Breach bunny cake business continuity business email business IT costs business recovery Business Security BYOD cable Cell Phones CES change background change mnagement charleston regional business journal check boxes window 7 christmas scams cloud cloud computing Cloud Services Cloud Solutions company network computer and network spending computer back up computer backup computer care computer checkup computer cleaning computer clean up computer injuries Consulting conversation view CourageousKidz cupcake kabobs customize ribbons cyber bullying Cyber security Daniel Lightner data backup data back up data recovery data storage defrag defragment dektop virtualization Depog desktop desktop virtualization digital pack rat Disaster Recovery disaster recovery plan Discovery Training Center disk clean up disk defrag disk defragment display flag properly documentation double your windows droid incredible easter cake ebook electric eye email email cleanup email etiquette email policy email scams email schemes email solutions email to cell phone encryption excel Facebook Facebook app father's day gift guide FBI Warnings fcc femtocell firewall first jukebox flag day fourth of july future ghost cookies gmail Google Music googletv green computing Green IT groupme Hackers Hacking halloween halloween fun facts halloween recipes hardware cleaning HIPAA HITECH home user hosted exchange HP Touchpad Hugo hulu Human Resources Hurricane iCloud Impersonation improve cell phone signal inbox inbox organization Information Technology Integration Internet internet safety internet search internet shortcuts internet speed test iPad ipad2 iphone ipod touch Irene IT budget IT Consulting IT costs IT Custom Solutions IT Finance IT Logistics IT Myths IT Operations IT Provider it support iTunes itv junk email keyboard shortcuts kik, path kindle kinect Kotori Technologies KREG laptop lawn care tips learn to type length of cd's light bulbs MAC Managed Service managed services Manufacturing march recipes mascot memory storage microsoft xbox Mobile App Management Mobile Devices Mobile Management Monitoring mortratious mother's day mummies in a blanket music name game national broadband plan neadom tucker netbook net nanny network audit network monitoring Network Security Network Security Issues network support nintendo wii no cable or satellite NonProfit notebooks Nubio office 2010 online gaming online safety online shopping safety optix email optix mail security organize gift giving our it outlook organization outlook tips pandigital novel Paper Shredding passwords peanut butter eggs peer to peer Petya Phone Systems pin to taskbar pin up folders Playstation power breakfast Preparedness Presidential facts Presidents Day printers printer security Privacy problem steps recorder Productivity product reviews project management protect your data pumpkin stew quick steps Quick Tips rainbow cupcakes Ransomware recent documents recipes red white and blue jello pie remove programs Risks, riso noodle house safe data save information save money saving money scam scandisk schedule Security security, server cleaning shopkick shortcuts side by side skype outage slow computers Small Business small business success summit smart phones social networking social networks in outlook Sony sony ereader sony playstation move Sophos spider cookies spring cleaning sunbelt vipre symbols tablet task bar tips taskbar tips technology test the daily this week in tech tips turkey tetrazinni type faster typing typing characters uncle sam cupcakes uninstall programs updates vendor management virtual hosted exchange Virtual Infrastructure virus VoIP WannaCry web page shortcuts website website audit website help,website wifi in your car windows 7 windows 7 tips windows calculator windows update wireless wireless security Workforce Management xbox xbox live Yamodo zip file