There is much that security professionals can learn from Stuxnet, says Adrian Davis, principal research analyst at ISF for the Stuxnet Think Tank. The malware should have sounded a call to action on several fronts.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
First, says Davis, IT managers should ensure all laptops, servers, desktops, multifunction devices and process control systems are configured correctly and securely.
Second, never allow anything on the network to connect directly to the internet. “Route all traffic through your firewalls and demilitarised zone [DMZ],” says Davis.
“If there are devices that need to connect directly, don’t put them on your network or put them behind a firewall. Control connections to devices using VPN access, and consider physical or logical segregation of your networks.”
Third, where possible, disable the use of USB devices, says Davis. “If you have to use USB sticks to transfer data or updates, consider using dedicated USB devices.”