Guidelines and Security Best Practices to Help Minimize a Potential Threat to your Network

Thirtyseven4 EDR Security multilayer protection approach:

Thirtyseven4 EDR Security comes equipped with multiple layers of protection to proactively combat all the latest and emerging Threats and Malware.  The Thirtyseven4 multi-layer approach is handled by various Thirtyseven4 modules including: Realtime-Protection, Behavior Detection System (BDS), File based detections, Cloud based detection, URL-cat/Web Protection, Email Protection, Anti-Ransomware. The combined layered protection allows Thirtyseven4 to protect against known and unknown threats/malware. For the unknown threats, Thirtyseven4 relies on our behavior-based BDS and Anti-ransomware modules that provide Next-Gen, heuristic detection for common tools, techniques and tactics used by adversaries to carry out malicious intent – like ransomware encryption of multiple files at once. This module proactively assists in detecting known/unknown malware in real-time.

In addition to deploying a powerful and robust solution like Thirtyseven4 EDR Security, below are few guidelines and security best practices to help minimize a potential threat to your network:

 Email:

  • Enable Multi-Factor authentication to ensure all logins are legitimate.
  • Set password expiration & account lockout policies (in case the wrong password is entered)
  • Don’t open attachments and links in an email sent by an unknown, unexpected or unwanted source.

Delete suspicious looking emails you receive from unknown sources, especially if they contain links or attachments. Cybercriminals use ‘Social Engineering’ techniques to trick users into opening attachments or clicking on links that lead to infected websites.

  • Always turn on email protection of your security solution.

 Secure Browsing 

  • Always update your browser
  • Try to avoid downloading pirated/cracked media or software from sites like torrents.
  • Block ad pop-ups in the browser.
  • Always verify whether you are accessing the genuine site by checking the address bar of the browser. Phishing sites often show content resembling a genuine one.
  • Bookmark important sites to avoid being a victim of phishing
  • Do not share your personal details like name, contact number, email id, social networking site credentials for any unknown website.
  • Do not install extensions in browsers which you are not fully aware of. Be aware of impersonating web-pages and do not “allow” any prompt on an unknown web page that you are visiting. Avoid visiting crack software download websites. 

Take regular data backup

  • Back up your important data regularly and keep a recent backup copy offline. Encrypt your backup
  • Always use a combination of online and offline backup
  • If your computer gets infected with ransomware, your files can be restored from the offline backup, once the malware has been removed.
  • Do not keep offline backups connected to your system as this data could be encrypted when ransomware strikes. 

Users & privileges

  • Regularly audit “Local / Domain Users” and remove/disable unwanted users.
  • Set a strong password to user/email etc. accounts (Strong password includes letters in UPPER CASE, lower case, numbers & special characters. However, a bad example would be common passwords like P@ssw0rd, Admin@123#, etc.)
  • Set password expiration & account lockout policies (in case the wrong password is entered)
  • Don’t assign Administrator privileges to users
  • If possible, enable Multi-Factor authentication to ensure all logins are legitimate
  • Don’t stay logged in as an administrator, unless strictly necessary
  • Avoid browsing, opening documents or other regular work activities while logged in as an administrator. 

Keep software updated

  • Keep your Operating System and other software updated. Software updates frequently include patches for newly discovered security vulnerabilities which could be exploited by attackers. Apply patches and updates for software like Microsoft Office, Java, Adobe Reader, Flash, and Internet Browsers like Internet Explorer, Chrome, Firefox, Opera, etc., including Browser Plugins.
  • Always keep your Security software (antivirus, firewall, etc.) up-to-date to protect your computer from new variants of malware.
  • Do not download cracked/pirated software, as they risk backdoor entry for malware into your computer.
  • Avoid downloading software from untrusted P2P or torrent sites. In most cases, they harbor malicious software. 

Network and Shared folders

  • Keep strong and unique passwords for login accounts and network shares.
  • Disable unnecessary, admin share. i.e. admin$. Give access permission to shared data as per requirement.
  • Audit RDP access & disable it if not required or else, set appropriate rules to allow only specific & intended systems
  • Change RDP port to a non-standard port.
  • Configure firewall in the following way,

o Deny access to all to important ports (in this case RDP port 3389)

o Allow access to only IP’s which are under your control.

  • Use a VPN to access the network, instead of exposing RDP to the Internet.
  • Possibly implement Two Factor Authentication (2FA).
  • Set lockout policy which hinders guessing of credentials.
  • Create a separate network folder for each user when managing access to shared network folders.
  • Don’t keep shared software in executable form

 Trust us to protect you.

The best offense is a proactive cyber-security defense, and knowledge.  Thirtyseven4 EDR Security provides both.


About Thirtyseven4 EDR Security:

Thirtyseven4 EDR Security exceeds cyber security insurance requirements and includes:

• Advanced EDR Capabilities
• A.I. based Ransomware Protection
• Next-Generation Malware Engine
• Automated Curative Response
• Advanced Next-Generation Anti-virus protection
• Automated/Monitored/Dynamic Endpoint Detection & Response (EDR) functionality
• A.I. based Ransomware Protection
• Next-Generation Malware Engine
• Automated Curative Response
• Removal of Current Antivirus Product
• Integrated Patch Management
• Anti-Keylogger modules
• Asset Management
• Firewall
• PC-Tuning
• Content Filtering
• Malware Detection & Removal
• Vulnerability Scanning
• Email Security
• Advanced Device Control

If you’re interested in receiving a non-obligation quote for Thirtyseven4 EDR Security, please complete the form located at:
https://www.thirtyseven4.com/get-a-quote/

We are grateful to be serving over 2,400 schools, businesses and non-rofits across the Nation and Thirtyseven4 EDR Security cares for our customers! We want the higher level of Security and Service for you and Thirtyseven4 EDR Security is it.

 

Thirtyseven4, LLC is dedicated to serving customers with a full palette of security solutions including AntiVirus, AntiMalware, Anti-Ransomware and Zero-Day Threat Protection.