There is much that security professionals can learn from Stuxnet, says Adrian Davis, principal research analyst at ISF for the Stuxnet Think Tank. The malware should have sounded a call to action on several fronts.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
First, says Davis, IT managers should ensure all laptops, servers, desktops, multifunction devices and process control systems are configured correctly and securely.
Second, never allow anything on the network to connect directly to the internet. “Route all traffic through your firewalls and demilitarised zone [DMZ],” says Davis.
“If there are devices that need to connect directly, don’t put them on your network or put them behind a firewall. Control connections to devices using VPN access, and consider physical or logical segregation of your networks.”
Third, where possible, disable the use of USB devices, says Davis. “If you have to use USB sticks to transfer data or updates, consider using dedicated USB devices.”