More Subjects
Runbook/Playbook Part 3 – Network, Mobile Device, And Cloud Services Guidelines
Network connections
The organization can secure its network connections by setting a password on Wi-Fi. It must avoid using an open Wi-Fi connection. WPA and WAP2 will provide strong encryption that will minimize the risks of malware. Another appropriate strategy is to avoid broadcasting SSID. The company can itself gain access by typing SSID manually. The wireless device must avoid showing its presence. It is safe to use a different password for a guest SSID. A practical method involves the installation of anti-malware product on all computers and devices and keeping system updated CITATION Kas18 \l 1033 (Kaspersky, 2018).
Mobile devices
There are effective methods that can be adopted for protecting mobile devices from malware. The organization can restrict employees from using public Wi-Fi. It is appropriate to use safe websites only that carry updated malware defense and HTTPs security. Checking HTTP will inform the users about the risky and non-risky sites. Running default OS browser is a practical method of securing devices. Installation of anti-virus apps minimizes the risks of malware or security breaches. Biometric authentication also reduces the risks of malicious activities. Passwords are easy to guess so employees can be instructed to use biometric identifiers. Avoiding third-party play stores is an effective strategy for mitigating risks CITATION Jay181 \l 1033 (Jay, 2018).
Cloud services
Malware in cloud services can be protected by the adoption of risk mitigation strategies. The first step is to keep systems updated that include operating systems, plugins and critical security patches. Enhanced protection demands intelligence defense technologies that are capable of monitoring, uploading, downloading and storing cloud files. SaaS and IaaS applications also enhanced the security of cloud computing. Organizations can identify malicious activities and conduct risk estimation. Machine learning is useful for uncovering future threats.
References
Jay, J. (2018). Five simple ways to protect your phone from malware, ransomware, and viruses. Retrieved 02 11, 2019, from https://indianexpress.com/article/technology/techook/five-simple-ways-to-protect-your-phone-from-malware-ransomware-and-viruses/
Kaspersky. (2018). Protecting Wireless Networks . Retrieved 02 11, 2019, from https://www.kaspersky.com/resource-center/preemptive-safety/protecting-wireless-networks
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net