While air-gapped systems are certainly more secure by virtue of fewer attack avenues, it doesn’t necessarily mean that these systems are foolproof or that they are automatically safe simply by being disconnected from the network. Especially important is knowing the different social engineering strategies used in phishing and spear phishing attacks. All employees and end users that have access to the air-gapped system should be educated on proper security strategies.While this does not prevent data breaches or attacks from occurring, it can prevent cybercriminals from putting the data to use in the event of a successful attack. Given the sensitivity of the data contained within these air-gapped systems, organizations should ensure that this data is encrypted.USB ports, which are often the most plausible method of infection, can be blocked using simple devices such as USB port locks. USB and CD drives, as well as external hardware like printers, should not be connected to the system, as these have the potential to be avenues of attacks for cybercriminals. Organizations should also ensure that connected peripherals are limited to absolute necessities.Exposure can open up a system to compromise, and given that these systems most likely hold critical information, this can be disastrous. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |