Earlier today we released IPS Signatures 39866-0 and 39866-1 as part of the S603 update to our Cisco Services for IPS customers. These signatures detect or block network traffic associated with the “R2D2 trojan” allegedly used by German authorities to surveil individuals of interest. Originally discovered and announced by the Chaos Computer Club in Germany, this software contains functionality to install software, monitor and remotely control any computer it is installed upon.
Many people often think that information and network security is just about technology and how reliable or sophisticated these technologies are. Additionally, many people ask why after spending tons of money on network and security gear, their network still gets hacked, information is lost and business continuity is disrupted. For example, often questions like these run through their minds: “Am I not buying the right security products? Am I not configuring or deploying them correctly? Do I have the right staff to run my network?”
As the economy stutters forward and more corporations and businesses begin to lift travel restrictions for employees, more laptops will be traveling, too. National Cyber Security Awareness Month is a good time to rethink an inexpensive, low-tech solution to securing potentially millions of dollars worth of intellectual property and corporate brand protection.
Perhaps you are one of the lucky ones finally able to attend a professional conference. You’ve packed your bags and your laptop, brushed up your industry jargon, made sure the coffee pot is turned off and the cat is fed, and backed out of your driveway to make a happy trip to the airport.
This week Cisco is announcing the ASA 1000V cloud firewall, a product that we previewed at VMworld last month and in an earlier blog post. This video provides a very high level introduction to our latest virtual security product.
Keeping up-to-date on new threats and software updates is critical to maintaining a secure network
You’ve installed a firewall andintrusion prevention system (IPS) to secure the perimeter of your small business network. You’ve configured your protection measures to filter dangerous traffic, secure remote access, and control who can access your network. You’ve added antivirus and antimalware software to every computer and laptop in your organization. Your business is now safe from attackers lurking on the Internet, right?
Well, yes, for now. But if you don’t keep up with the constantly changing world of security vulnerabilities, your network won’t stay locked down for long.
New network vulnerabilities and security attacks are continually cropping up. Technology vendors discover new holes and release patches to their products’ firmware and software on a regular basis. But attackers are moving just as fast to exploit those holes and invent new ways to break into your network.
There are three ways you can stay on top of this moving target. Depending on how comfortable you are handling your network security, you can take a completely DIY approach by following vendors’ advisories, subscribe to a service that will inventory and automatically update your software, or contract with a security professional to manage security updates for you.