article thumbnail

16 Remote Access Security Best Practices to Implement

eSecurity Planet

The technologies for secure remote access can range from VPNs and multi-factor authentication to more advanced access and zero trust controls. We’ll cover a range of best practices for remote access security, from the simple and the practical to the more advanced. Avoid using default or simple-to-guess passwords.

article thumbnail

A PowerShell Script to Mitigate Active Directory Security Risks

eSecurity Planet

protocol in your environment via the Secure Channel method, enable Secure Channel logging on domain controllers. Look for Event ID 36880 after enabling Secure Channel logging, which will log the protocol version used to establish the connection. protocol, you will need to correlate multiple events.

Risk 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IaaS Security: Top 8 Issues & Prevention Best Practices

eSecurity Planet

Breaking Authentication Attackers can get unauthorized access to the IaaS environment by exploiting weak authentication systems or weaknesses in the authentication process. This danger emphasizes the significance of having strong authentication mechanisms and upgrading access controls on a regular basis.

article thumbnail

Vulnerability Recap 4/1/24: Cisco, Fortinet & Windows Server Updates

eSecurity Planet

The problem: The March 12th Microsoft security patches introduced a memory leak flaw in the local security authority subsystem service (LSASS) process that consumes all physical and virtual memory on server Domain Controllers. Oglio tracks vulnerability CVE-2023-48022 , rated CVSS 9.8 (out out of 10), and calls it Shadow Ray.

article thumbnail

How Secure Is Cloud Storage? Features, Risks, & Protection

eSecurity Planet

Data Security & Recovery Measures Reliable CSPs provide high-level security and backup services; in the event of data loss, recovery is possible. Users have direct control over data security but are also responsible for backup procedures and permanently lost data in the event of device damage or loss.

Risk 122
article thumbnail

Weekly Vulnerability Recap – September 4, 2023 – Attackers Hit Network Devices and More

eSecurity Planet

Major cybersecurity events in the last week make clear that hackers just keep getting savvier — and security teams need to be vigilant to keep up. Consider adopting network security measures like intrusion detection and prevention systems (IDPS) to identify and prevent harmful traffic from reaching your RocketMQ server.

VPN 103
article thumbnail

Spear Phishing Prevention: 10 Ways to Protect Your Organization

eSecurity Planet

For the purpose of establishing connections, they may refer to past events, colleagues, and shared experiences. contaminated attachments, links to counterfeit websites, or instructions for performing activities that could pose a security risk) is commonly included in the message. Introducing Malicious Content A malicious element (e.g.,