Eradicate the Bots in the Belfry

At the upcoming Information Security Summit, I will be presenting on the topic, “Eradicate the Bots in the Belfry.”┬á Bots are used for a variety of malicious activities including sending spam and conducing DDoS (Distributed Denial of Service) attacks such as those recently in the news.┬á Ymy network is probably hosting bots right now.┬á A recent study showed that 40 percent of computers have one or more pieces of malware on them and this malware could be attacking other companies or disclosing important company or customer data.

So how can you immunize your business against this threat?  First, obtain a baseline of the activity on business computers so that unusual activity can be identified.  Set up monitoring and metrics to alert you to unusual activity and create an incident response plan to handle infections and data breaches.  Attend the summit for more information on how to protect business and others.

13 thoughts on “Eradicate the Bots in the Belfry

  1. I am curious to find out what blog platform you are using? I’m experiencing some minor security issues with my latest blog and I’d like to find something more secure. Do you have any suggestions?

    • It can be tough to migrate to a new platform. I would first see if you can shore up the security problems with your current system. Disable any features you are not using. Update your install and plugins to the latest versions to take advantage of security fixes. If you are hosting it yourself, secure the box it is on. If someone else is hosting it, make sure that they are a reputable vendor. I hope that helps.

  2. The speaker evaluations for the ÔÇ£Eradicate the Bots in the BelfryÔÇØ presentation at the Information Security Summit have been released and I would like to thank everyone who submitted an evaluation. There were 19 evaluation responses out of the 52 people who attended the session. Overall, the presentation was rated “very good.”

  3. Hello! I just would like to give a huge thumbs up for the very good info you’ve here on Security Spotlight. I are going to be coming back to your blog for much more soon.

Leave a Reply

Your email address will not be published. Required fields are marked *