![]() ![]() It seems as though there’s a brand-name company in the news just about every week that’s dealing with the fall-out of a successful cyberattack.Īt the same time, our information economy dictates that almost every organization now has an operational need to share data externally. Cybercriminal targets can range from small and medium sized companies or local government agencies up to global enterprises. Cybercriminals continue to steal intellectual property and terabytes of data by successfully penetrating network infrastructures and end-user machines. Today's cyber threat environment is a lot different. There is an ongoing race between the IT security measures applied by businesses and security threats deployed by cybercriminals. We've even had customers claim that their network monitoring discovery process has turned up FTP servers they didn't know existed. In other cases, either the original administrator or a script author has since left the company taking the knowledge necessary for adequate management with them. In some cases, because some FTP servers were originally spun up for innocuous reasons in 'Anonymous' mode where password protection is minimal. Over the last few years, security conscious organizations have come to realize that a multitude of FTP servers can pose a risk. In many organizations, multiple departments would set up their own FTP servers, often on different hardware platforms and using a variety of scripts to handle any automation needs. That need was often addressed by setting up an FTP (File Transfer Protocol) server. Since the early days of the internet, there has been a need to send or share files externally. ![]() One often overlooked area that can leave you vulnerable to cyber attack are outdated or under-managed FTP servers. In your efforts to secure critical business and personal data, don't forget your file transfer and data sharing systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |