To effectively safeguard your environment against cybersecurity threats, consider implementing the following measures:
EPP/EDR Deployment
Install and configure Trend Micro agents on all endpoints to provide protection from malware attacks and enable visibility in the Trend Micro™ Managed Detection and Response (MDR) service. This helps detect and mitigate threats in real-time.
- Enable the XDR Sensor/Activity Monitoring feature on machines where it is not already enabled to facilitate Trend Micro™ Managed Detection and Response.
Reference: Integrate Workload Security with Trend Vision One
Trend Micro Solution Configuration
Establish a baseline configuration for Trend Micro solutions to ensure a standardized setup in accordance with Best Practice settings. This ensures that system and network events are processed optimally, utilizing modules such as Activity/Behavior Monitoring and Agent Self-Protection.
Trend Micro Products Best Practice Configuration
Implement recommended settings for better malware protection. Refer to the Best Practice Guide list for Trend Micro products.
- Phishing Resistant Multi-Factor Authentication (MFA)
Use phishing-resistant multi-factor authentication methods, such as FIDO-based authentication with devices like YubiKey's or password-less MFA. This reduces the risk of compromised credentials being exploited for further attacks. MFA should be used for externally-exposed applications, remote network access (including VPN, RDP, etc.), and privileged accounts. Additionally, consider using Privileged Access Management (PAM) software for privileged accounts.
- User Security Awareness Training
Conduct user security awareness training to empower individuals to recognize and protect themselves against the latest threats. For more information and best practices about internal spear phishing, visit:
Implement the least privilege principle on access control and ensure individuals only have the minimum access privileges necessary to perform their specific job or task. Limiting access reduces the attack surface for ransomware and other threats.
- Regular Software Updates
Regularly update software by employing patch management on web applications and other public-facing devices.
- System Hardening: Keep machines patched and updated, ensure essential third-party software is up-to-date, remove unnecessary third-party software, use strong and complex passwords, and limit and authenticate system access permissions.
- System Backups
Routinely create, protect, maintain, and test backups for critical operational systems. Store backups separately from the source system and off-network to mitigate potential tampering or impact on restoration points.
- Security Awareness and Skills Training
Establish and maintain a security awareness program to influence behavior among the workforce, making them security-conscious and properly skilled to reduce cybersecurity risks. Focus on recognizing social engineering attacks and reporting unusual behavior that could lead to security incidents. Trend Cyber Risk Assessments, powered by Trend Vision One™, can assist in orchestrating phishing simulations.