<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sandeep Kumar &#8211; VTINFOSEC</title>
	<atom:link href="https://vtinfosecgroup.com/author/sandeep/feed/" rel="self" type="application/rss+xml" />
	<link>https://vtinfosecgroup.com</link>
	<description>MSSP and 24X7 Cyber Security Monitoring Services</description>
	<lastBuildDate>Sat, 18 Apr 2020 23:39:25 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.8</generator>

<image>
	<url>https://vtinfosecgroup.com/wp-content/uploads/2020/04/cropped-Capture-32x32.png</url>
	<title>Sandeep Kumar &#8211; VTINFOSEC</title>
	<link>https://vtinfosecgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Are you ready to respond to COVID-19 Cyber Threats?</title>
		<link>https://vtinfosecgroup.com/are-you-ready-to-respond-to-covid-19-cyber-threats/</link>
					<comments>https://vtinfosecgroup.com/are-you-ready-to-respond-to-covid-19-cyber-threats/#respond</comments>
		
		<dc:creator><![CDATA[Sandeep Kumar]]></dc:creator>
		<pubDate>Sat, 18 Apr 2020 21:43:44 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Creative]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[World]]></category>
		<category><![CDATA[Covid - 19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Monitoring]]></category>
		<guid isPermaLink="false">https://vtinfosecgroup.com/?p=7206</guid>

					<description><![CDATA[Tips and Best Practices for Overall Cybersecurity Are you one of the many companies quickly adopting new work approach, including Work From Home/Remote Work, Here is our [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Tips and Best Practices for Overall Cybersecurity</strong><br />
Are you one of the many companies quickly adopting new work approach, including Work From Home/Remote Work, Here is our best advice for maintaining continuity of your business and keeping the bad actors and threats away.</p>
<p>Working remotely is no longer an optional part of your business it is now a business-critical practice. Balance the work delivery with diligence in ensuring security practices are maintained to keep data and systems safe.<br />
You don&#8217;t want to keep your employees vulnerable in what is now a mission-critical situation.</p>
<p><strong>Install a Multi-Factor Authentication (MFA)</strong><br />
Credentials stealing and abuse is at the root of most attacks involving remote access services. If possible, make sure your company is using the combination of Multi-Factor Authentication (MFA), Virtual Private Networking (VPN) technology, and MFA for all cloud base services including your office365 and similar cloud services.</p>
<p><strong>Controls in place to Detect and Prevent Phishing Emails</strong><br />
Bad actors are now on verge of using phishing emails as a way to get into your network and employees are getting targeted. Have a phishing reporting mechanism in place, keep educating your workforce not to click any link or attachment, if they are not sure about it. Increasing security controls on your email communication.</p>
<p><strong>Keep Endpoints Updated with latest AV definition</strong>s<br />
Make sure that your endpoints are up to date with the latest AV definitions and intrusion detection rules to prevent modern days attacks.</p>
<p><strong>Geo-Fencing Monitoring and Response</strong><br />
If you are not a company that doesn&#8217;t have a global presence this something might be interesting to you, have your firewall ready to tackle traffic coming from unusual geo-locations that you don&#8217;t have business or employees working from and actively monitoring and block those. Create more sophisticated rules on endpoint IPS and on Network IDS/IPS to monitor and block unusual traffic.</p>
<p><a href="https://vtinfosecgroup.com/services/managed-security-services/" target="_blank" rel="noopener"><strong>Increase monitoring and visibility</strong></a> across this unique ecosystem including endpoint, network, and cloud services and task cyber protectors with actively seeking threats and re-entry efforts. In combination, this can provide a momentary mitigating control while the company works through the challenge of responding to the event.</p>
<p><strong>Incident Planning in the New Virtual World</strong><br />
You are unquestionably discussing contingency planning as part of your business continuity plans. I want to inspire you to also incorporate cybersecurity contingencies in that conversation.<br />
Do you have a cybersecurity emergency information, management and response plan?<br />
Can you correlate multiple stages of an attack that could lead to a catastrophic event (e.g. ransomware) and neutralize the problem early, before it becomes a disaster?</p>
<p>We know our <a href="https://vtinfosecgroup.com/" target="_blank" rel="noopener"><strong>VTINFOSEC</strong></a>  customers depend on us. Our teams around the world are committed to being your cybersecurity partner in this digitally connected world—the larger WE simply cannot allow threat actors to exploit this crisis. Our communities are already fragile, so we cannot tolerate anything that results in additional financial burden, business disruption or patient care risk.<br />
Good cybersecurity practices will carry you through. We will be alongside you every step of the way, protecting the progress of our customers so you can stay focused on being there for your employees and customers.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://vtinfosecgroup.com/are-you-ready-to-respond-to-covid-19-cyber-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 30/84 objects using disk
Page Caching using disk: enhanced 

Page cache debug info:
Engine:             disk: enhanced
Cache key:          vtinfosecgroup.com/author/sandeep/feed/_index_slash_ssl.xml
Creation Time:      1714228205.000s
Header info:
Last-Modified:      Sat, 18 Apr 2020 23:39:25 GMT
ETag:               "57a1851dd72102ececedc367e807b228"
X-Powered-By:       W3 Total Cache/2.2.4
Link:               <https://vtinfosecgroup.com/wp-json/>; rel="https://api.w.org/"
Link:               <https://vtinfosecgroup.com/wp-json/wp/v2/users/2>; rel="alternate"; type="application/json"
Content-Type:       application/rss+xml; charset=UTF-8

Database Caching 1/20 queries in 0.017 seconds using disk (Request-wide modification query)

Served from: vtinfosecgroup.com @ 2024-04-27 14:30:05 by W3 Total Cache
-->