Testing Your Dedicated Server Defenses

 
HILLSBORO, Ore. - March 19, 2014 - PRLog -- Configuring and defending your dedicated server against attacks from outside your network or datacenter is good practice, however actually testing the defenses is the best way to determine how fortified your dedicated server really is. There are several ways to do this.

Thinking Like a Bad Guy

Hackers are not blindly going after any and all servers in cyberspace trying to get in to anything they find. This is simply a waste of time and effort since there are always easier targets out there with weaker or no defenses at all. Most hackers will do some simple information gathering to determine exactly who they are targeting, what Operating System they are running, how many employees, how past security issues were handled (news & updates postings for example), how the site works and interacts with visitors/clients, and where they are defended and not so well defended. Is it a financial site? Is it a database of clients? Is it local or foreign?

After some time, an opening can present itself in the form of a new script exploit, something in the news about a vulnerability or simply trying a new attack during a company event or update.

“Remember to update before hackers can take advantage of a new script or software vulnerability”

Since hackers are searching for paths of minimal resistance on an ongoing basis, always keep security a top priority at all times and make sure to let your security policies adapt alongside new threats. This is why it is important to conduct regular penetration testing to ensure your security software and hardware passes ongoing tests.

Testing Your Defenses

There are several ways to test your security defenses using several outside services run by experts in this particular field. These range from free security scanning to more sophisticated services that perform more deep and thorough scanning. One such service is SiteLock which performs scans on your network, checks for malware or SQL Injections, setup a web application firewall etc.

For more information on security threats please go here: http://www.hostinganddesigns.com/HD/value-added-services/...

If you do find security holes in your dedicated server there is always the option to acquire the services of the security scanning service to patch up the vulnerabilities (usually at an added cost) or ask your dedicated server provider for assistance which should in most cases be free of charge depending on their value added services SLA and technical support coverage.

Another good way to test whether your security is up to the task is to seriously consider having it tested by outside “white hat” hacker services.

Attacks do not always come in the form of software, scripts or brute force attacks and cracking. In many cases hackers will go after individuals with administrative or high security clearance to obtain confidential or personal information. This might be via Facebook or LinkedIn where it would not be difficult to find someone working for a particular company. Then from there, proceed with targeted attacks and phishing attempts to gain access to secure areas tricking the victim into revealing the administrative or root password, usually via a legitimate looking company website or email, among many other tricks.

Monitoring User Activity

If a customer service rep is downloading an entire database at one time, user activity monitoring should be raising a red flag on this as this would not be a normal activity for one person to do. Strange patterns or unusually activity on a dedicated server should also be a warning sign. Are there monitoring tools in place to raise awareness of these activities? If so, what are the safety procedures and who is notified?

Log management runs alongside monitoring user activity and should be setup to keep track of what users log in where, accessed what and for how long. Also, if anything was done to certain files would also be a helpful feature. Viewing several files is not the same as downloading them either. It is still however, much more important to prevent intrusions or unauthorized access from happening in the first place, but if it happens, minimizing the damage and minimizing access time as quickly as possible can help a great deal in limiting the intrusion.

A popular system for this type of monitoring is Security Information and Event Management solutions.

These systems work in realtime, can provide log reports, provide alerts and retain log data. One caveat can be cost as some systems cost several thousand dollars.

One of the cheapest solutions to prevent phishing for example is to inform all your employees or clients on these types of attacks and to let them know how your system works, how passwords are retrieved and simply how a help desk operates so they know what would be considered unusual and what to avoid. This also includes providing limited information on social networking sites (as mentioned earlier) so hackers don’t have an easy way of setting up phishing emails and copycat login pages.

Contact
Hosting And Designs L.L.C.
***@hostinganddesigns.com
End
Source: » Follow
Email:***@hostinganddesigns.com Email Verified
Tags:Server Security, Hackers, Malware, Cybersecurity
Industry:Security, Technology
Location:Hillsboro - Oregon - United States
Subject:Reports
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
Hosting And Designs L.L.C. PRs
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share