Preventing Lateral Movement

Implementing effective security measures can help delay and detect lateral movement attempts within your organization. 1. Safeguard Credentials All credentials on a network, particularly those associated with administrator accounts, must be thoroughly protected to prevent unauthorized access to systems and devices. A prevalent attack method involves stealing a security token to access another device or…

Read More

Private Branch Exchange (PBX) best practice

Important Notice: A Private Branch Exchange (PBX) is a crucial telecommunications system that manages and routes phone calls within an organization. By following the steps detailed in this guidance, you can significantly minimize the risk of your PBX system being compromised by attackers, who may aim to commit fraud, launch denial of service (DoS) attacks,…

Read More

Provisioning and securing security certificates

Certificates play a crucial role in enabling encryption services. They are essential for identifying and authenticating clients and gateways during the establishment of encrypted connections. This guidance provides instructions on the initial provisioning of certificates and the secure operation of the supporting infrastructure. A. Approach To establish secure IPsec and TLS VPN connections, certificates based…

Read More

Provisioning and securing security certificates

Certificates play a vital role in delivering encryption services. They are essential for identifying and authenticating clients and gateways during the establishment of encrypted connections. This guidance outlines the initial provisioning of certificates and the secure operation of supporting infrastructure. A. Strategy For most IPsec and TLS VPN connections, devices and gateways must utilize certificates…

Read More

Provisioning and securing security certificates

Certificates play a crucial role in delivering encryption services. They serve to identify and authenticate clients and gateways at the moment encrypted connections are established. This document provides guidance on the initial provisioning of certificates and how to securely manage the supporting infrastructure. A. Strategy For most IPsec and TLS VPN connections, devices and gateways…

Read More

Provisioning and securing security certificates

Encryption certificates play a crucial role in establishing secure communications. They serve to identify and authenticate both clients and gateways whenever an encrypted connection is initiated. This document outlines best practices for the initial provisioning of certificates and the secure operation of the supporting infrastructure. A. Strategy In most cases involving IPsec and TLS VPN…

Read More

Provisioning and securing security certificates

Certificates play a crucial role in providing encryption services, as they are essential for identifying and authenticating clients and gateways during the establishment of encrypted connections. This guidance outlines the initial provisioning of certificates and the secure operation of supporting infrastructure. A. Strategy For most IPsec and TLS VPN connections, it’s necessary for devices and…

Read More

Responding to a cyber incident – a guide for CEOs

Intended Audience for This Guidance This guidance is designed for CEOs operating in both public and private sectors to effectively navigate a cyber incident. It outlines critical considerations to address at the onset and throughout the incident response process. The Importance of This Guidance In the wake of a significant cyber attack, organizations face numerous…

Read More
Back To Top