How to secure your organization from cyber attacks
https://www.zyxware.com/sites/default/files/styles/user_image/public/default_images/index.png?itok=2YmREnrP
BY Nisha.Oommen
2 years ago
Web-Security
0
comments comment

According to a recent British government research, two third of large UK businesses are hit by cyber breach or attacks in the last year 1. The British government is urging business to protect themselves against cyber attacks. Cybersecurity measures can be to a large extent handled proactively with a well mapped out strategy that is reviewed continuously.

Top to bottom-level engagement is critical to the success of a firm’s cybersecurity programs, along with a clear chain of accountability. Prevention of cyber attacks is better than damage control. A good cyber security strategy makes sure that all the bases are covered.

Effective training helps to reduce the likelihood of an attack by providing the knowledge to minimize the chances of becoming targets. Cyber security threats can be due to environmental, physical or system level threats.

Environmental Security

Cyber security strategies that mitigate targeted cyber intrusions are:

  • Restricting Administrative Privileges

    Limit those who have the admin rights to configure manage, and monitor computer systems.

  • Whitelisting Applications

    Allowing only approved applications to be installed or run.

  • Application Security Patching

    Enforcing effective practices to deploy new security patches regularly as and when alerted.

  • Operating System Security Patching

    Employing security patches for the operating system.

The strategy begins with the identification of what information the company needs to be protected and where it is located. Backups ensure that an organization can recover quickly by restoring lost or damaged files.

Physical Security

Another important line of defense in cybersecurity is the physical protection of the organization’s IT property. Companies should create an accurate inventory of:

  • Hardware and systems
  • Software platforms and applications
  • Maps of network resources, connections and data flows

System Level Security

  • A good project management cum issue tracking tool should be used for storing access credentials for a project. Access rights are to be controlled by the concerned manager of technology.
  • To access the git repo of a client project, the public key of a developer needs to be added to the git repo.
  • Git access allowing read/write permissions to different users.
  • Linux based systems improve protection against data vulnerability.

To prevent unauthorized access, we at Zyxware also have in place the following.

  • Only employees, management, and special visitors are allowed on the premises with a valid Photo ID.
  • Employees are provided with laptops/desktops and personal devices are not allowed. Network access within the premises is given only to systems with authorized Ids.
  • Routers access area is locked and protected.
  • In development, we follow Drupal security and coding standards to sanitize user data.

Cyber security training and awareness should be made mandatory for all personnel. Even basic precautions like restricting access to computer contents by locking the screen when away from desk adds.

Thus in essence, for an effective enterprise-wide cyber security a sound security strategy should be developed and implemented. Zyxware Technologies knows the importance of being proactive against cyber attacks. We have set in place cyber security protocols to ensure transparency in dealing with client information. To know more about how we can help you build web applications while ensuring security of the site, do get in touch with us!

References:
1. https://www.gov.uk/government/news/two-thirds-of-large-uk-businesses-hi…
2. https://www.owasp.org/index.php/Review_Old,_Backup_and_Unreferenced_Fil…

3. http://www.businesswire.com/news/home/20161102005369/en/Accenture-Surve…
4. http://www.iiroc.ca/industry/Documents/CybersecurityBestPracticesGuide_…


RELATED ARTICLE

close

on 15th June 2012 / by deepa.n
Password-protecting drupal development site with .htaccess file There might be few scenarios when we need to protect our site from the general public and make it accessible to a selected group of users. One of the most common scenarios in the development workflow of a Drupal site is when you want to avoid your half-complete drupal site showing up in Google search results.For such needs, it is advisable to go for password-protecting the site using HTTP authentication. If you have cPanel installed on your hosting server, you can use the ‘Password Protect Directories’ option from the ‘Security’ section on the cPanel home page. Click here to read on How to enable HTTP Authentication using cPanel (link to an article for the same on our site) For those without cPanel, here’s how to get Apache work your way: Password protection on directories using .htaccess and .htpasswd: On a hosting server running using apache as the webserver, you need to do the following things to add HTTP Authentication (password protection) to your site: Create .htpasswd file Add/modify .htaccess file 1. Create .htpasswd file .htpasswd (do not forget to add the ‘.’ before htpasswd) is the file that stores the HTTP username and password. You need to tell Apache to verify against the credentials given in .htpasswd. First, to create .htpasswd with the desired username and password, SSH into your server (or open up a terminal window on your local machine, cd (change directory) to the folder where you want to create your password file, and type in the following command: htpasswd -c .htpasswd You'll be prompted to enter and retype your password, then the .htpasswd file will be created for you. Here’s what it looks like: user@user-desktop:~$ htpasswd -c .htpasswd userjohn New password: Re-type new password: Adding password for user userjohn If you open up the file, you can see the username and encrypted password generated. It looks something like this: userjohn:lOy81yOkKmeXc Step2: Add/modify .htaccess file .htaccess (that too, with the ‘.’), is the file that tells apache what custom settings to use for the site. What we have to do here is that we have to add the setting in .htaccess that tells apache to use the password in .htpasswd. Drupal has a default .htaccess file in its root. You just have to put in the following lines of code to your .htaccess file: AuthUserFile //.htpasswd AuthType Basic AuthName "Restricted Access" Require user userjohn is the path to the file from the Web server's root folder - for example, /home/username/.htpasswd or C:\wwwroot\username\.htpasswd. The above .htaccess file will password protect all files in the folder that it is placed in, and all sub-folders under that folder. For protecting your entire site, just place it in your web root. Apache Server Administration Drupal Security Web Security Access Control Leave a reply Your email address will not be published. Required fields are marker * website (not verified) access_time 26 Mar 2019 - 08:33 Hey this is kinda of off topic but I was wondering if blogs use WYSIWYG editors or if you have to manually code with HTML. I'm starting a blog soon but have no coding experience so I wanted to get guidance from someone with experience. Any help would be enormously appreciated! Add new comment
close

on 29th June 2012 / by Anoop John
Apache allows you to protect contents of specific directories in your website or the whole website from unauthorized access using a mechanism called httpd password protection. During development of new sites the partially built sites are protected from unauthorized access using httpd authentication. This could sometimes interfere with testing of integration with third party services that might expect some of your URLs to be accessible without authentication. Here is how you can exclude a given file or directory from httpd authentication The standard set of lines in htaccess to enabled httpd authentication is as follows AuthType Basic AuthName "Auth Required" AuthUserFile /path/to/.htpasswd Require valid-user Now adding the following below this will allow you to exclude directories and files # Allow access to excluded diretories SetEnvIf Request_URI "path/to/excluded/directory/" allow SetEnvIf Request_URI "path/to/excluded/file" allow Order allow,deny Allow from env=allow Satisfy any If you wrap the above in a <Limit GET> section you can limit the authentication to GET requests only. You can also allow access from specific IP addresses by adding the following for each IP you wish to allow Allow from 208.67.222.222 Apache Server Administration Drupal Security Web Security Access Control Leave a reply Your email address will not be published. Required fields are marker * Muddy Mind (not verified) access_time 26 Mar 2019 - 08:33 Nice work this helps me a lot to some basic changes in my blog :) Add new comment
close

on 04th July 2013 / by sandeep.sasikumar
On certain servers, there are chances of our IP addresses getting blocked when we accidentally enter the wrong password multiple times or when we unintentionally try to ssh via the wrong port multiple times. The IP will be blocked for a certain period of time. If you have faced the same issue then read on to know how to block blacklisted IP addresses on a WHM based GNU/Linux server. Before trying to solve the problem we have to check the following things to identify where we went wrong: Check whether the username and password you entered is correct Check whether your passwords have unnecessary spaces. Check the default ssh-port Now lets see how to remove the blocked IP from WHM Login to WHM with the username and password [The funny part about the initial step is that now you won't be able to log into WHM because your IP is blocked, so try from any another connection with a different IP :) ]. After logging in to WHM the next step is to find out the 'Plugins' option. In the 'Plugins' option select 'ConfigServer Security&Firewall' In this option you will see a list of different features and from this list note the feature titled 'Temporary allow/deny', under this you can see your IP address. To unblock your IP address simply remove that IP from the IP address field. Now try connecting with your IP address and you should be able to acess it:) Linux System Administration Server Administration WHM Network Security Web Security Leave a reply Your email address will not be published. Required fields are marker * Alaa (not verified) access_time 26 Mar 2019 - 08:33 Thanks for the info. Anonymous (not verified) access_time 26 Mar 2019 - 08:33 i am using putty but not working my ip. Anonymous (not verified) access_time 26 Mar 2019 - 08:33 This is just what i have been looking for long. Got most of my routers ip blacklisted on whm. I read the tute, logged in the vps and cleared them up. Thanks Michelle (not verified) access_time 26 Mar 2019 - 08:33 It seems this normally happens when you make a change to a website or email on a diffrerent i.p. Either way thanks for the help. Jeffery (not verified) access_time 26 Mar 2019 - 08:33 May I know how to remove our IP from the Gmail blacklist? I need to know the reason why I was blacklisted. Here is my blog maxautoglass.com and I need help to configure a static IP address from Windows 7. Add new comment
Leave a reply
Your email address will not be published. Required fields are marker *

Filtered HTML

  • Web page addresses and email addresses turn into links automatically.
  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type='1 A I'> <li> <dl> <dt> <dd> <h2 id='jump-*'> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
The content of this field is kept private and will not be shown publicly.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.