{"id":145168,"date":"2017-03-27T19:00:00","date_gmt":"2017-03-27T19:00:00","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=145168"},"modified":"2017-03-27T19:00:00","modified_gmt":"2017-03-27T19:00:00","slug":"recomandarile-specialistilor-kaspersky-pentru-strategiile-de-securitate-ale-companiillor","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=145168","title":{"rendered":"Recomand\u0103rile speciali\u015ftilor Kaspersky pentru strategiile de securitate ale companiillor"},"content":{"rendered":"<p>\n1. Fi\u0163i aten\u0163i la atacurile cu \u0163int\u0103 precis\u0103<\/p>\n<p>\nEste foarte posibil ca atacurile cu \u0163int\u0103 prestabilit\u0103 asupra organiza\u0163iilor financiare s\u0103 fie realizate prin intermediul unor ter\u0163i sau contractori. Adesea, aceste companii au o protec\u0163ie mai slab\u0103 sau nicio protec\u0163ie \u015fi pot fi folosite ca o poart\u0103 de acces pentru malware sau tentative de phishing.<\/p>\n<p>\n2. Nu subestima\u0163i amenin\u0163\u0103rile mai pu\u0163in sofisticate<\/p>\n<p>\nInfractorii pot lovi \u00een mas\u0103, \u00een mod profitabil, folosind instrumente simple. Este posibil ca tehnicile de social engineering s\u0103 contribuie la 75% din incidentele de fraud\u0103, \u00een timp ce doar 17% s\u0103 fie cauzate de malware.<\/p>\n<p>\n3. Nu alege\u0163i conformarea \u00een detrimentul protec\u0163iei<\/p>\n<p>\nBugetele sunt de obicei alocate astfel \u00eenc\u00e2t s\u0103 se asigure conformarea la reglement\u0103ri, dar pentru consolidarea securit\u0103\u0163ii \u015fi introducerea unor noi tehnologii de protec\u0163ie este nevoie de o abordare mai echilibrat\u0103 \u00een alocarea resurselor.<\/p>\n<p>\n4. Face\u0163i teste de intruziune la interval regulate<\/p>\n<p>\nVulnerabilit\u0103\u0163ile nev\u0103zute sunt, totu\u015fi, reale. Prin implementarea unor instrumente de detec\u0163ie complexe \u015fi a testelor de intruziune, vulnerabilit\u0103\u0163ile \u015fi incidentele vor ie\u015fi la iveal\u0103. Fi\u0163i aten\u0163i la toate sl\u0103biciunile \u015fi amenin\u0163\u0103rile, \u00eenainte de a fi prea t\u00e2rziu.<\/p>\n<p>\n5. \u0162ine\u0163i cont de amenin\u0163\u0103rile interne<\/p>\n<p>\nAngaja\u0163ii pot fi folosi\u0163i de infractorii cibernetici sau pot decide s\u0103 treac\u0103 ei \u00een\u015fi\u015fi de cealalt\u0103 parte. Strategiile eficiente de securitate trebuie s\u0103 mearg\u0103 mai departe de protejarea incintei \u015fi s\u0103 includ\u0103 tehnici care pot detecta activitatea suspect\u0103 din interiorul organiza\u0163iilor.<\/p>\n<p>\nCosturile asociate atacurilor cibernetice asupra sectorului financiar sunt \u00een cre\u015ftere, av\u00e2nd \u00een vedere c\u0103 organiza\u0163iile \u00eent\u00e2mpin\u0103 amenin\u0163\u0103ri tot mai complexe. O nou\u0103 cercetare&nbsp; realizat\u0103 de Kaspersky Lab \u015fi B2B International, arat\u0103 amploarea \u015fi impactul atacurilor, firmele financiare \u00eenregistr\u00e2nd pierderi de aproape un milion de dolari (926.000 de dolari), \u00een medie, pentru fiecare incident cibernetic pe care \u00eel au.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exper\u0163ii Kasperky Lab fac cinci recomand\u0103ri cheie pentru strategiile de securitate adoptate de organiza\u0163iile financiare \u00een 2017.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[238,23957,15977,363,201,16350,11056,32766,17927,16943,10657,210,7536,9843,31831,16386,10481,8327,219,7745,9356,16708],"class_list":["post-145168","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-acces","tag-alocare","tag-amenintari","tag-atacuri","tag-companii","tag-experti","tag-financiar","tag-folosire","tag-incidente","tag-infractori","tag-kaspersky","tag-lovire","tag-organizatii","tag-phishing","tag-posibilitate","tag-protectie","tag-recomandari","tag-scadere","tag-securitate","tag-specialisti","tag-teste","tag-tinta"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/145168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=145168"}],"version-history":[{"count":0,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/145168\/revisions"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=145168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=145168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=145168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}