Cyber Defense Magazine – July 2019

(Sean Pound) #1

invest more time and efforts in endpoint and communications cryptography – we can expect the much
better technological outcomes on.


How to configure your Firewalls?


As it’s known, the Firewalls are the ongoing method of the IT system protection, but they cannot
guarantee the absolute security, so far. In our opinion, the intelligent coding where the developers would
work carefully on every piece of their program could make us some invitations of the much more secure
software and much more convenient users’ experience. Basically, getting breached is so stressful
condition and the hackers could try to take advantage over someone’s poor cyber defense in order to
make the huge profit on. The Firewalls could get observed as the protection walls that got the capacity
to reflect some of the attempts to get the permission to approach someone’s IT infrastructure.
Unfortunately, they are not absolutely reliable way of security and we believe that there would be a plenty
of new paths that would get invoked in the future.


The importance of breach prevention


Once some individual or organization figures out it got breached and exploited by the cybercrime actors



  • it can cope with a lot of drama and trauma targeting their personal and business needs as well as
    interests on. If we know that the cyber breach would affect someone’s finances and reputation, we should
    try to think hard about the measures of preventions putting into account all social and economical impacts
    the IT breach brings with itself. In other words, the breach prevention is one of the biggest challenges of
    the modern cyber security.


The final comments


Finally, just accepting that breach is inevitable is so passive approach and in the future we must think
how to deal in more active and even proactive way in order to remain safe. At this moment, we are only
able to cope in the quite reactive fashion with the cyber breaches and we are in position to discover the
breaches once they occurred. In other words, it’s so necessary to formulate the good tactics and
strategies that would give us the chance to avoid the cyber breaches even affect our assets and systems,
so far.

Free download pdf