κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Simple Steps for Attack Surface Reduction
άμυνα
.

Simple Steps for Attack Surface Reduction

14/08/2025

Aug 14, 2025The Hacker NewsEndpoint Security / Application Security
Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks before they start, and the best defense may come down to the settings you choose on day one. In this piece, Yuriy Tsibere explores how default policies like deny-by-default, MFA enforcement, and application Ringfencing ™ can eliminate entire categories of risk. From disabling Office macros to blocking outbound server traffic, these simple but strategic moves create a hardened environment that attackers can’t easily penetrate. Whether you’re securing endpoints or overseeing policy rollouts, adopting a security-by-default mindset can reduce complexity, shrink your attack surface, and help you stay ahead of evolving threats.
Cybersecurity has changed dramatically since the days of the “Love Bug” virus in 2001. What was once an annoyance is now a profit-driven criminal enterprise worth billions. This shift demands proactive defense strategies that don’t just respond to threats—they prevent them from ever reaching your network. CISOs, IT admins, and MSPs need solutions that block attacks by default, not just detect them after the fact. Industry frameworks like NIST, ISO, CIS, and HIPAA provide guidance, but they often lack the clear, actionable steps needed to implement effective security.
For anyone starting a new security leadership role, the mission is clear: Stop as many attacks as possible, frustrate threat actors, and do it without alienating the IT team. That’s where a security-by-default mindset comes in—configuring systems to block risks out of the gate. As I’ve often said, the attackers only have to be right once. We have to be right 100% of the time.
Here’s how setting the right defaults can eliminate entire categories of risk.
Require multi-factor authentication (MFA) on all remote accounts
Enabling MFA across all remote services—including SaaS platforms like Office 365 and G Suite, as well as domain registrars and remote access tools—is a foundational security default. Even if a password is compromised, MFA can prevent unauthorized access. Try to avoid using text messages for MFA as it can be intercepted.
While it may introduce some friction, the security benefits far outweigh the risk of data theft or financial loss.

Deny-by-default
One of the most effective security measures nowadays is application whitelisting or allowlisting. This approach blocks everything by default and only allows known, approved software to run. The result: Ransomware and other malicious applications are stopped before they can execute. It also blocks legitimate-but-unauthorized remote tools like AnyDesk or similar, which attackers often try to sneak in through social engineering.
Users can still access what they need via a pre-approved store of safe applications, and visibility tools make it easy to track everything that runs—including portable apps.
Quick wins through secure configuration
Small changes to default settings can close major security gaps on Windows and other platforms:

  • Turn off Office macros: It takes five minutes and blocks one of the most common attack vectors for ransomware.
  • Use password-protected screensavers: Auto-lock your screen after a short break to stop anyone from snooping around.
  • Disable SMBv1: This old-school protocol is outdated and has been used in big attacks like WannaCry. Most systems don’t need it anymore.
  • Turn off the Windows keylogger: It’s rarely useful and could be a security risk if left on.

Control network and application behavior for organizations

  • Remove local admin rights: Most malware doesn’t need admin access to run, but taking it away stops users from messing with security settings or even installing malicious software.
  • Block unused ports and limit outbound traffic:
    • Shut down SMB and RDP ports unless absolutely necessary—and only allow trusted sources.
    • Stop servers from reaching the internet unless they need to. This helps avoid attacks like SolarWinds.
  • Control application behaviors: Tools like ThreatLocker Ringfencing ™ can stop apps from doing sketchy things—like Word launching PowerShell (yes, that’s a real attack method).
  • Secure your VPN: If you don’t need it, turn it off. If you do, limit access to specific IPs and restrict what users can access.

Strengthen data and web controls

  • Block USB drives by default: They’re a common way for malware to spread. Only allow secure managed, encrypted ones if needed.
  • Limit file access: Apps shouldn’t be able to poke around in user files unless they really need to.
  • Filter out unapproved tools: Block random SaaS or cloud apps that haven’t been vetted. Let users request access if they need something.
  • Track file activity: Keep an eye on who’s doing what with files—both on devices and in the cloud. It’s key for spotting shady behavior.

Go beyond defaults with monitoring and patching
Strong defaults are just the beginning. Ongoing vigilance is critical:

  • Regular patching: Most attacks use known bugs. Keep everything updated—including portable apps.
  • Automated threat detection: EDR tools are great, but if no one’s watching alerts 24/7, threats can slip through. MDR services can jump in fast, even after hours.

Security by default isn’t just smart, it’s non-negotiable. Blocking unknown apps, using strong authentication, locking down networks and app behavior can wipe out a ton of risk. Attackers only need one shot, but solid default settings keep your defenses ready all the time. The payoff? Fewer breaches, less hassle, and a stronger, more resilient setup.Note: This article is expertly written and contributed by Yuriy Tsibere, Product Manager and Business Analyst at ThreatLocker.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

Source: thehackernews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-2

Haiku and SerenityOS aren’t daily drivers, but they’re the best weekend projects

Most people stick to Windows, macOS, or Linux because they get the job done with minimal hassle. They support a vast range of hardware, have robust ecosystems, and are built for day-to-day use. That doesn’t mean they’re the only operating systems worth trying. Away from the mainstream, projects like Haiku and SerenityOS demonstrate that there’s still plenty of room for alternative visions of how … [Read More...]

I clustered budget-friendly devices into a Proxmox HA lab, and it's more useful than I thought

Between its support for LXCs, community scripts, and simple management UI, Proxmox has a ton of features to make home labs more accessible to beginners and casual users. Unlike its rivals (especially ESXi), Proxmox requires minimal CPU, memory, and storage provisions. It also works right-out-of-the-box with most hardware, making it a terrific option for budget-friendly setups. However, despite its … [Read More...]

If you just need a laptop for the basics, this one at $349 is an absolute steal

This laptop is perfect for someone that's looking for something new on a budget. The Asus Vivobook 15 packs power with an Intel Core 5 processor, and also comes with a good amount of RAM and storage. But what makes it stand out right now is that steep discount from Walmart. For a limited time, you can score this laptop for $349, which is an absolute steal. Source: xda-developers.com … [Read More...]

The best Prime Day SSD deals: Save on gear from Samsung, Crucial, Seagate and others

If you've never considered adding a solid-state drive (SSD) to your PC or game console, October Prime Day is a great time to start — and if you already know what a difference extra storage can make, October Prime Day is the perfect time to outfit your build. For those who haven't heard of SSDs, they're physical upgrades that stack on top of a device's storage to make more files accessible at once. … [Read More...]

3 mistakes that ruined my first attempt at building a PC

Building your very first PC is never really easy, no matter how many tutorials you've watched on YouTube or parts you've memorized. In fact, it took me a couple of weeks just to properly research and source the parts for my first gaming rig back in 2012. By the time everything arrived, I thought the hard part was behind me. I knew that putting the parts together as a beginner would be … [Read More...]

The Reinforcement Gap — or why some AI skills improve faster than others  

AI coding tools are getting better fast. If you don’t work in code, it can be hard to notice how much things are changing, but GPT-5 and Gemini 2.5 have made a whole new set of developer tricks possible to automate, and last week Sonnet 2.4 did it again.   At the same time, other skills are progressing more slowly. If you are using AI to write emails, you’re probably getting the same … [Read More...]

The best Amazon Prime Day kitchen deals: Get up to 50 percent off our favorite air fryers and more

Whether you call it October Prime Day or use Amazon’s official title, Prime Big Deal days, the sale represents some of the lowest prices of the year in nearly every department — and that includes kitchen gear. We have a slew of food enthusiasts on staff who have tested plenty of excellent kitchen tech, as seen in our reviews and buying guides. We’ve covered everything from air fryers to sous vide … [Read More...]

Astronomers Spot Rapidly Growing Rogue Planet Feeding on Surrounding Gas

Astronomers have identified the fastest-growing planet ever observed, a free-floating world known as Cha 1107-7626. Located about 620 light-years from Earth, it is between five and ten times the mass of Jupiter. The rogue planet has been detected, and it has entered a sudden growth burst in recent months. It is swallowing down six billion tonnes of gas every second, making it the hungriest … [Read More...]

4 reasons why installing HACS was the best decision for my Home Assistant instance

While the Home Assistant Community Store (HACS) is considered by some people to be one of the best tools you can use with Home Assistant, I only stumbled upon it a while after setting up my own server. I'm still very early in my Home Assistant journey, but as I've gotten to know the platform better, I've realized that installing HACS was the best decision for my instance. Source: … [Read More...]

The Young Minds App wants to protect and educate children online and will show its tech at TechCrunch Disrupt 2025

An app called Young Minds wants to give parents control over what their kids do on the internet, while also protecting their children’s privacy and teaching them good online habits.  The startup was founded by Nino Dvalidze (pictured), an entrepreneur and a mother of two from the United Kingdom. Dvalidze told TechCrunch that the idea for Young Minds came from conversations with fellow … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • Haiku and SerenityOS aren’t daily drivers, but they’re the best weekend projects
  • I clustered budget-friendly devices into a Proxmox HA lab, and it's more useful than I thought
  • If you just need a laptop for the basics, this one at $349 is an absolute steal
  • The best Prime Day SSD deals: Save on gear from Samsung, Crucial, Seagate and others
  • 3 mistakes that ruined my first attempt at building a PC

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023