At COMMit we highly value our customer relationships. We hold a high standards at keeping customer’s data secure and recommend the most secure solutions for them. In doing so we recognize and respect the security concerns of our customers and satisfy their needs to the best of our abilities. From the best hardware to the best software we assure our customers are safe & secure. COMMit partnered with ESET has the best and highest security software available in the market today.
In the current IT environment cyber-crimes are on the rise. Many enterprises don’t realized that there are multiple ways a person can enter a server. In many cases getting in the server isn’t used to steal data but to use the server for “Mining”. A background program is installed and used for the mining process. Mining servers are used for many different reasons. A “hacker” will use a company’s server to attack other companies. This crime is done to camouflage the hacker while he works.
Apart from mining a hacker can use your server to access your important applications and stored data. Personal information can be obtained from the server. There are countless reasons why you need to protect your server.
In order to protect you from these challenges COMMit recommends you to close all unnecessary ports and never give admin rights to common users. If your users need access create a user account without admin rights. If the user’s machine is compromised and he/she has admin rights to your server it can be easily “phished” for server credentials. Phishing is a process used for getting personal information and credentials from users. User machines should not have admin access to their machines to control downloading of programs which may have viruses that give way to security breaches. A list of authorized programs should be constructed and user downloading should be restricted. User accounts on local machines and servers should have a password policy. COMMit recommends a 45 day retention on passwords with a complex password requirement.
Once your server is compromised and discovered the server should immediately be taken offline and examined. The threat will need to be removed and the entry point would need to be determined. Additional security processes would need to be put in place before returning the server online.
COMMit not only builds infrastructure solutions we also manage the IT for many companies. Our customers trust us to oversee and keep all of their infrastructure secure. With onsite, remote and offsite emergency support services to thousands of SME and Enterprise customers we pride our customer relationships and their trust in us.
Disclaimer: All content provided on this blog is for informational purposes only. COMMit makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. COMMit will not be liable for any errors or omissions in this information nor for the availability of this information. COMMit will not be liable for any losses, injuries, or damages from the display or use of this information. These terms and conditions of use are subject to change at any time and without notice.