Recommendations for ensuring cyber security in the information infrastructure of organizations
―Update the used software and operating systems in time, if the vulnerabilities in the software are not eliminated, you should temporarily stop using this product;
―Disabling unused network services and ports or closing them for external Internet (For example: opening ports only for the TAS-IX network or enabling them only for trusted IP addresses);
―Using licensed tools for configuring VPN tunnels for remote connection to workstations;
―Disable remote connection to Windows desktop via RDP or enable only for trusted IP addresses;
―Setting a rule to block responses to ping requests;
―Setting a rule to block potentially unnecessary applications;
―Using two-factor or complex authentication;
―Using TLS v1.2 or TLS v1.3 secure protocols;
―Setting up tools to protect web applications from cyberattacks, such as: cross-site request forgery (CSRF), cross-site scripting (XSS), SQL injection, etc.;
―Development of an incident response plan;
―Regular data backup and encryption;
―Teaching the employees of the organization about the rules of cyber hygiene;
―Licensed operating systems, security programs and plug-ins, as well as the use of antivirus programs to protect servers and computers from malicious programs and regularly update their virus database;
―Conducting an information security audit in the organization;
― Setting restrictions on the use of resources that are necessary for the employees only in the course of work;
― Configure “SPF and DMARC” policy to protect corporate e-mail from spam and phishing emails.