![]() ![]() If you don't restrict the services that hosts in your internal networks can access, malware will inevitably find its way onto some of your hosts and may exfiltrate data to a location that an attacker controls. Data exfiltration could be also unintentional, i.e., an insider might incorrectly attach sensitive information an email message to upload it to a document sharing service. Filter Egress Traffic to Protect Yourself In this column, I discuss ways organizations can improve their risk profile and be better 'netizens by implementing egress traffic filtering. ![]() Companies large and small are better served when network administrators are equally concerned with threats that are associated with outbound connections. Attackers can use these to collect and forward sensitive information from your network or to attack or spam other networks. Today's landscape is littered with threats that emanate from malware-infected endpoints. Too many network administrators think only to protect their private network resources from external attacks when assessing security threats.
0 Comments
Leave a Reply. |