ESSENTIAL LAYERS IN YOUR DEFENSE
As another example, “deny” rules against Simple Mail Transport Protocol (SMTP) on workstations make it more difficult for cybercriminals to use a compromised endpoint as a SPAM bot to blast out more email phishing attacks with Trojan attachments. By using a combination of outbound firewall rules, network segmentation, and a SIEM to capture log information and alert suspicious activity, the Trojan’s attempts to infect and communicate internally and externally […]