DataSecure maintains several Service Delivery Centers across Global locations to provide clients with the “virtual capacity” to quickly respond to emerging technology. These delivery centers help meet business needs and thus fast-track, cost-optimize and develop technology excellence towards their pursuits for business excellence and customer delight.

Contacts

Spaces Waterfall, Ground Floor, 22 Magwa Crescent, Midrand 1685

info@datasecc.co.za

+27(11) 083-7086 | +27 (79) 183-0877 | +27(11)083-9415

// VULNERABILITY MANAGEMENT

Continuously Monitor Your Network Health

If your applications are delivered with vulnerabilities attached – it won’t matter how good your network security is. This is true whether they’re hosted on-premise or in the cloud.

While patching will resolve most vulnerabilities found on your network, others can have a bigger impact such as careless administration and use of IT equipment. These need to be managed as much, if not more than patches.

Examples of non-patch related vulnerabilities include:

• A new printer is installed without changing the default password. This printer caches printed documents with the last 100 documents printed available to anyone on the network
• A web developer turns on the ‘TRACE’ method on a production website to debug a problem and forgets to turn it off. Criminals can do ‘Cross Site Tracing’ on your website, allowing them to trick your visitors into thinking they’re seeing your trusted DataSecure when they’re really viewing the criminal’s DataSecure
• A user installs a piece of software with a light database in the backend. The database has a well-known default SA password, and supports passing through shell commands. This creates a back door into your domain.

 

These types of events occur too frequently to be detected by an annual penetration test. Periodic vulnerability management, ranging from daily to quarterly per year, is an excellent measure to ensure your network doesn’t fall into an insecure state between penetration tests.

If you can’t say for certain that “all vulnerabilities on my environment create only minimal and tolerant risks” contact DataSecure Security and find out what the true risk your vulnerabilities actually are.

// Drop us a line! We are here to answer your questions 24/7

NEED CONSULTATION?