NSA releases list of 25 vulnerabilities targeted by China

October 21, 2020
  • Keep systems and tech products updated and patched as soon as patches are released.
  • Expect that patching will not alleviate data stolen or modified before the device was patched, making password changes and account reviews a good practice.
  • Disable external management capabilities and set up an out-of-band management network. 
  • Block obsolete or unused protocols at the network edge, and disable them in device configurations.
  • Isolate internet-facing services in a network DMZ to reduce the exposure of the internal network.
  • Enable robust logging of internet-facing services and monitor the logs for compromises.
prestitial ad