System aministrators should not be the only ones with root access rights in a company, penetration testers Aaron Beuhring and Kyle Salous said, according to The Register. To help enterprises deter hackers, the researchers shared a series of security commandments at the recent MIRCon conference in Washington.
Companies should first make targeted malware too expensive by hardening their systems, the pen testers advised. Enterprises could also implement low-cost security measures such as changing access controls, whitelisting and efficient group policies.
You can train users all you want, but unless they are reverse-engineers, they aren’t going to stop clicking things,â€ Aaron Beuhring said. â€We’re not saying whitelisting is easy. You need to create inventory of programs you run and you need to understand the protocols they run on.â€
To understand what is being used, enterprises should place their application control systems into â€listening mode,â€ the Â pen testers said. Companies should also have several administrators for their systems, while regular employees should never be given admin rights.
â€None of your users should ever log in as administrator,” Kyle Salous added. â€Create a separate admin account for everyone in your tech department. Every time we make attackersâ€™ work harder is an opportunity to detect their activity.â€
The two researchers also talked about Cryptolocker and its â€cool aspect of encrypting all the data.â€ The ransomware, which Bitdefender has technically documented since 2013, made headlines this year after infecting the systems of over half a million victims.