5/20/2016
01:58 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

5 Tips for Protecting Firmware From Attacks

Don't let hackers take advantage of holes in firmware. Here's how to stop them.
3 of 6

2. Practice security basics

Use solid security principles such as least privilege, in which you only grant access rights to a user for a specific business purpose. Companies also need to deploy standard defense-in-depth practices for their infrastructure, including firewalls, sandboxes and intrusion protection systems. IT managers also need to keep web browsers updated and install routine Windows or Mac updates. Other common practices include not to run applications as root and to disable unnecessary services.

Image Source: homesecuritybasics.com

2. Practice security basics

Use solid security principles such as least privilege, in which you only grant access rights to a user for a specific business purpose. Companies also need to deploy standard defense-in-depth practices for their infrastructure, including firewalls, sandboxes and intrusion protection systems. IT managers also need to keep web browsers updated and install routine Windows or Mac updates. Other common practices include not to run applications as root and to disable unnecessary services.

Image Source: homesecuritybasics.com

3 of 6
Comment  | 
Email This  | 
Print  | 
RSS
Copyright © 2019 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service