Security News > 2021 > September > 5 Steps to Securing Your Network Perimeter

5 Steps to Securing Your Network Perimeter
2021-09-27 20:29

So what measures should be taken to protect the network perimeter today, and which flaws are most commonly present in companies?

Which services are most frequently available to attackers? In Positive Technologies testing, we found every single company had TCP network ports 80 and 443 open on the perimeter.

The collected corporate email addresses can be used to brute-force credentials for network perimeter resources or remote access to the internal network, or to send phishing emails.

Our research into network vulnerabilities also found that more than half of companies have vulnerabilities allowing execution of arbitrary code on the server, and 16 percent of these flaws have publicly available exploits, meaning the organizations had not patched for known vulnerabilities.

In the worst case, this could let attackers breach the network perimeter and access the local network, opening up the possibility for them to then steal confidential data, encrypt files with ransomware, gain access to critical business systems or obtain full control over the infrastructure.

The network perimeter is a dynamic arena - if the situation isn't made better with effective security, it will surely get worse.


News URL

https://threatpost.com/securing-network-perimeter/175043/