Online Security Reading Time: 2 minutes

In a new byline in Security-Today, Comodo Director of Service Provider Technologies Michél Bechard writes about a layered approach to security and the infrastructure, and how it can help protect against advanced persistent threats.

IT Security

From the article:

APTs do not look for a home run at the outset. The main objective is to gain access into low priority areas the company fails to protect adequately: the endpoint. By being patient the hackers can gradually work their way into higher value segments of the network where important data resides.

Regardless of the method, the attack will not stop until proven fruitless; the agent will most likely invade the network. Mission accomplished.

Short of cutting your internet connection entirely, there are other steps that can be taken to defend the network and recover in the event defenses are breached. Here are seven layers of a security checklist that every IT Administrator should have in place to defend against the ATP and/or recover from the attack.

One of the seven layers given in the article: defend the soft interior. Train and educate users on security protocols, have BYOD and VPN policies in place; have acceptable use policies backed by C-level execs—visibly enforce these policies and ensure user training is concurrent with the latest threats.

To read about all seven layers in a security checklist, go to the full article at

If you feel your company’s IT environment is under attack from phishing, malware, spyware or cyberattacks, contact the security consultants at Comodo:
What is Endpoint Protection?

Related Resources:


IT Management Software Open Source Windows