Dell Recommends Six Steps to Counter Online Threats

  •  BY
  •  In News
  •  Dec 12, 2013
  •  1139
  •  0

The World Cup related spam emails have a common theme of trying to lure users of providing their personal information in exchange for full access to live streaming videos, says Dell SonicWALL

The 2014 FIFA World Cup has come to an end. For the millions of die-hard soccer fans that could not watch the games on television during typical work hours, many turned to the internet to find any way to watch the action as the excitement of the games heightened. The cybercriminal communities have seized this opportunity to deceive fans online by broadcasting unsolicited advertisements for free live online streaming of the event and fake world cup related promotions that are difficult to resist.

Over the last week, the Dell SonicWALL threats research team has been tracking down all World Cup related spam emails. The emails have a common theme of trying to lure users of providing their personal information in exchange for full access to live streaming videos or to claim prizes from a FIFA lottery.  

Begin layering your defense system that will provide you many ways of preventing attacks and managing network bandwidth, says Dell. This includes:

1) Vigorously defend the endpoints as most network infections begin with a compromised user device. Enforce every device attempting to access the internet to have threat prevention capabilities such as content filtering capable of blocking inappropriate, illegal and dangerous web content.

2) Comprehensive gateway threat detection m services that can provide complete inbound anti-spam, anti-phishing and anti-virus protection.

3) Manage network bandwidth with application control capabilities to provide granular control of certain application–limiting or blocking access–by setting policies based on logical pre-defined categories (such as sports), individual applications, or even users and groups to keep business application running at full speed.

4) Breaking the malware kill cycle by investing in a capable intrusion prevention system because it is far easier to keep the bad guys out than to expel them.

5) Add SSL inspection and application control to detect and prevent today’s advance evasive tactics or compromised web applications from sneaking malware into the network.

6) And finally, ensure that there is a 24x7x365 threat response and counter-intelligence service for the firewalls and intrusion prevention systems so it can quickly receive the latest countermeasures to combat new vulnerabilities as they emerge.

 

Nike Air Penny 5


Add new comment