Five ways to declaw the Meow bot | SC Media

Five ways to declaw the Meow bot

August 6, 2020
  1. Understand your infrastructure. Start by understanding what data you have. Set up external scanning systems that continuously check for exposed databases. These free tools, which are also used by the attackers, give security teams immediate notification when a developer has mistakenly left sensitive data unlocked. For example, Shadowserver has a free scanner  available. 
  2. Lock down your data. It’s a basic point, but Bressers says people are busy and may have forgotten to enable the security features in the database or could have accidently shut it off. Just double-check and make sure to enable security. 
  3. Consider strong authentication. So many of these database wipes happen because people put unsecured databases on the public Internet. At the very least, issue a user name and password for the database. If it’s realistic and financially possible for your organization, there are also any number of MFA options, from text PIN codes to X.509 certificates to tools such as Google Authenticator.
  4. Remember authorization. This follows authentication. Sure, it makes sense to use MFA, but organizations also need to prioritize who has access to the data. For example, HR should only have access to employee information, and the accounting departments should only have access to budget and tax data.
  5. Hire a service provider. Not every company has the expertise to set the security configuration and manage the data properly. Find a service provider that can handle data management and has a strong security portfolio.
prestitial ad