<p>Network security is a great undertaking early on. The benefits to protecting your network are immediate as well as beneficial in the long term. However, the systems and practices which defend your organization and its network are not a “set it and forget it” machine. As threats are continually evolving, so must your defenses. Don’t let complacency set in to the point where you’re relying on an outdated cyber security infrastructure.</p><p>One component of a security plan that automatically outdates itself is antivirus software. While it is not enough to use SIEM alone, applications which defend the perimeter of your network by scanning for threats that fit its stored list of definitions is still a valid tactic. These applications are good at deflecting many known bots and known threats, unless software updates for definitions have lapsed. Outdated software is <a href="http://cfoc.org/expired-antivirus-database-identified-as-main-reason-for-unprotected-windows-8-computers/" target="_blank">responsible for 9.3% malware infections</a> of non-domain computers.</p><p>Running expired software will give you a false sense of security. Fortunately, outdated software is a very straight-forward problem to fix. Some updates can be loaded to a central console and set to sync to the definitions server automatically. In cases where computers have applications which prevent changes such as public browsing terminals, machines must be unfrozen and updated individually. Don’t let time consuming tasks prevent crucial maintenance; rather you should budget for the time and schedule the work regularly.</p><p>The email server can be a floodgate for trouble if not managed properly. Malware is often the first step in a hacker’s plan to get a foothold into a victim’s network. Once an initial error has occurred, installing malware via phishing for example, the whole system is compromised. Make sure you’re using a secure email server. Have strong password settings in place. Most importantly, encourage <a href="https://www.sans.org/security-resources/policies/general/pdf/email-policy" target="_blank">personal responsibility for individual email</a> accounts. Have a protocol for evaluating unusual emails and forbid account sharing.</p><p>In general, you should be continually evaluating your strategy and practices before you have an outdated cybersecurity infrastructure. Here are the kinds of questions you should continually be asking:</p><ul><li>Have new elements been added to the network?</li><li>Are we making use of our <a href="https://www.anomali.com/blog/">threat intelligence platform</a>?</li><li>Does your configuration account for traffic created by mobile users?</li><li>Are the most sacred files sufficiently protected?</li><li>Really, even if an employee accesses cloud data from an infected home computer?</li></ul><p>Are permissions current? Are procedures in place to ensure all employees credentials and email addresses are closed after they leave? Some businesses only remember to close this vulnerability when an employee makes a dramatic exit.</p><p>Outdated education is a problem for up to half of enterprises. Old information about the types of tactics hackers are using is as useful as outdated virus definitions. It’s a shame to waste effort on training sessions, presentations, and meetings if the information therein is outdated, inaccurate, or altogether lacking key topics.</p><p>Polls show <a href="http://www.itproportal.com/2016/04/18/uk-organisations-cyber-security-training-is-outdated/" target="_blank">only 46% of employers offer more</a> education than a one-time refresher course. In order to remedy this, educators themselves must keep up on current best practices. Attending conferences allow security pros to immerse themselves and can help renew enthusiasm. <a href="{page_1864}">Workshops, whitepapers and webinars</a> are great for getting a deeper understanding of new threats and ways to combat them. Following cybersecurity blogs and reading trade publications should be done continually for consistent awareness. Learn how to get the most out of your particular tools by soliciting as much expertise from security vendor partners as possible.</p><p>Employees need continual ongoing education. The stakes are high enough that making a case for starting an education program should not be a hard sell. However, if there is a pushback, there is plenty of evidence that preventing ignorance-based vulnerabilities is a wise risk management strategy. If user education is not deemed important, you should consider the evidence that resolving a hack is very expensive and can take your business out of the game permanently.</p><p>Maintaining your cyber security infrastructure is an ongoing responsibility. Like maintaining a house, it is best to be proactive about keeping everything in good working order. If there is a possibility of a vulnerability or possible threat actor, address concerns before they become crises. <span class="hs-cta-wrapper" id="hs-cta-wrapper-f68f0b2e-fb62-48eb-acd6-8b2ad6455083"> <span class="hs-cta-node hs-cta-f68f0b2e-fb62-48eb-acd6-8b2ad6455083" data-hs-drop="true" id="hs-cta-f68f0b2e-fb62-48eb-acd6-8b2ad6455083" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_3451}" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=0a81b108-0c35-466f-8ccb-36ff661bc040&placement_guid=f68f0b2e-fb62-48eb-acd6-8b2ad6455083&portal_id=458120&redirect_url=APefjpF1Rg8qrvB30fKoSHoYCzdA-AfwRXoI8DriwA417HAcUoWJjQ4KWfASqlvF3vKPUtGVePDaw3FkRFvkums_clPIsvEUH0c70u8w8M7do9Jo1Mq5MecIVaZHsXjmCOCHLyMy6lr5ADfbfryCZ_9ansLuSlQEbm-XoLvHVvIffsMo0oR0yiBq4yZkNKGFsOLAcUpUcZR8j3HVJ7Jmj0ZyhpZGhQ-zgLofpDaBptMLc6fDUjnXsoXajA78qepHl2Fx3jeQwaar4184HpmHbPYwoebMWhyqBnYnwseoiNrPrwNuJA35DVWrmm4XyQGeygrEhF1qBFs2Xhycq7gPMK5e0bcFoRGYGA&hsutk=2767d93d6471d657e0c9f660e4b58ef8&utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fhow-to-determine-if-you-have-an-outdated-cybersecurity-infrastructure&canon=https%3A%2F%2Fblog.anomali.com%2Fhow-to-determine-if-you-have-an-outdated-cybersecurity-infrastructure&pageId=4312959619&__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&__hssc=41179005.14.1478831861868&__hsfp=1335165674" id="cta_button_458120_0a81b108-0c35-466f-8ccb-36ff661bc040" style="margin: 20px auto;" target="_blank" title="View It Here"> View It Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, 'f68f0b2e-fb62-48eb-acd6-8b2ad6455083', {});</script> </span></p>