{"id":1362,"date":"2014-01-13T11:00:48","date_gmt":"2014-01-13T17:00:48","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=1362"},"modified":"2019-12-17T09:57:59","modified_gmt":"2019-12-17T15:57:59","slug":"the-death-of-windows-xp-and-industrial-pc-security","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/the-death-of-windows-xp-and-industrial-pc-security\/","title":{"rendered":"CIFS Monitoring &#038; Industrial PC Security"},"content":{"rendered":"<h2><span style=\"color: #008000; font-family: verdana,geneva; font-size: 12pt;\"><strong>CIFS \u2013 How to Protect Legacy Industrial PCs (IPCs) <\/strong><\/span><\/h2>\n<p><span style=\"font-size: 12pt; font-family: verdana,geneva;\"><a title=\"\" href=\"\/help\/stm_5_6\/monitor_file_directory_change.aspx\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1386 size-full\" style=\"margin-right: 20px;\" title=\"Protect IPCs\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/Protect-IPCs.png\" alt=\"Protect IPCs\" width=\"128\" height=\"128\"><\/a>Before the popularity of cloud began to take over, the only choice that companies large and small had with regard to IT infrastructure, was to build their own network. This of course consisted of servers, web servers and workstations, all connected together for the purposes of information sharing, and was based on permissions as to who could access what.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: verdana,geneva;\">While it\u2019s safe to say that cloud offers an alternative to smaller businesses when it comes to IT infrastructure, it\u2019s not always the answer for larger organizations and this means that servers and IPCs are often still on-site.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: verdana,geneva;\">However, change is constant and this also means that many companies have \u2018legacy\u2019 IT hardware and software that they need to maintain. Implementing a completely new network is a costly affair and while choices exist with regard to hybrid cloud, for example, it\u2019s not always a viable option when it comes to capital expenditure and downtime.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: verdana,geneva;\">This means that many companies and organizations are still running legacy products, which may no longer be supported. This is especially true of Microsoft products and it\u2019s now old news that the company will be pulling support for XP in April this year. Add to this that support for Windows 2000 (best MS OS ever, IMO) ended some four years ago now and the security risks to these systems are substantial. This is where <a title=\"CIFS Monitoring\" href=\"https:\/\/www.poweradmin.com\/help\/pa-server-monitor-8-0\/monitor_file_directory_change.aspx\">CIFS monitoring (also known as File Integrity Monitoring or FIM)<\/a> can play a role in security.<br>\n<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><span style=\"color: #008000;\"><strong>What Support Does Microsoft Provide?<\/strong><\/span><\/span><\/h2>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\"><a title=\"\" href=\"\/blog\/wp-content\/uploads\/2014\/01\/Windows-XP-Support.png\" target=\"\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1392\" title=\"Windows XP Support\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/Windows-XP-Support.png\" alt=\"Windows XP Support\" width=\"104\" height=\"104\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/Windows-XP-Support.png 256w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/Windows-XP-Support-150x150.png 150w\" sizes=\"auto, (max-width: 104px) 100vw, 104px\"><\/a>With the aforementioned OS, at its most basic level it means that there will be no updates to the software, which could cause driver issues, but more importantly, leaves it with \u2018holes\u2019 in the OS in which malware can attack.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Generally, for newer OSs, Microsoft releases patches and updates to ensure that any vulnerability found in the OSs are \u2018closed\u2019 so that the risk of infection from malware and attackers is minimized. Unless there\u2019s a real emergency, these are usually released on \u2018 <a href=\"http:\/\/technet.microsoft.com\/en-US\/security\/bb291012\" rel=\"nofollow\" target=\"_blank\">Patch Tuesday<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>\u2019, which occurs on the second Tuesday of every month.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">However, from April of this year, this will no longer apply to Windows XP and although the software (trying to turn hardware) giants acknowledge that this will leave many open to various types of infection, including \u201cpermanent 0-days\u201d, complaining about it isn\u2019t going to make any difference.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><span style=\"color: #008000;\"><strong>Won\u2019t Antivirus Solutions Pick These Up?<\/strong><\/span><\/span><\/h2>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\"><a title=\"\" href=\"\/blog\/wp-content\/uploads\/2014\/01\/1389394535_antivirus.png\" target=\"\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-1387\" style=\"margin-left: 20px;\" title=\"Is Antivirus Enough\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/1389394535_antivirus.png\" alt=\"Is Antivirus Enough\" width=\"111\" height=\"111\"><\/a>Sometimes. AV products only work by protecting against threats that they already know about. So if a new threat, especially a 0-day threat comes along, then it\u2019s inadequate protection, especially for businesses. A 0-day threat basically means that it\u2019s not yet been recognized as a threat by the AV vendors and so can\u2019t be cleaned or quarantined before doing the damage.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Worms can be especially damaging, as they travel across a network quickly and while different variants have diverse effects, it\u2019s not something that any business needs on their network. Worms can completely disable programs, making them impossible to open and use, (this includes AV products) or can simply travel around the network stealing information as they go. Worms often also come packaged with other forms of malware, such as trojans, which can contain keystroke loggers and more.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Possibly the most famous worm is <a href=\"http:\/\/www.businessinsider.com\/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11\" rel=\"nofollow\" target=\"_blank\">Stuxnet<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, which attacked an Iranian nuclear plant with the intention of causing the engines to spin out of control. A similar worm, which was dubbed the \u2018Son of Stuxnet\u2019 was <a href=\"http:\/\/en.wikipedia.org\/wiki\/Duqu\" rel=\"nofollow\" target=\"_blank\">Duqu<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, which stole information rather than causing damage. Both of these are accepted to have been created by a state, rather than an individual hacker, and most security experts agree that it was an Israeli and US collaboration.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Worse than either of these was a worm known as Conficker, which in theory had the ability to take down the entire<em>\u00a0internet. <\/em>Imagine how much we rely on the net for national power systems, emergency services and so much more and it\u2019s a scary idea. The author of Conficker was never caught and the worm never dropped its <a href=\"http:\/\/www.veracode.com\/security\/computer-worm\" rel=\"nofollow\" target=\"_blank\">payload<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, but it\u2019s thought that millions of PCs around the world remain infected.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">The interesting thing about Conficker was the ability of its creator to stay one step ahead of the world\u2019s top security experts at all times, thwarting every attempt to stop it. If you\u2019re interested in learning more, then give Mark Bowden\u2019s (also author of <em>Black Hawk Down)<\/em> book <a href=\"http:\/\/www.groveatlantic.com\/?title=Worm\" rel=\"nofollow\" target=\"_blank\"><em>WORM: The First Digital World War<\/em><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>a read, it\u2019s fascinating stuff.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><span style=\"color: #008000;\"><strong>What if my IPC Isn\u2019t Internet Connected?<\/strong><\/span><\/span><\/h2>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\"><a title=\"\" href=\"\/blog\/wp-content\/uploads\/2014\/01\/1389394753_network.png\" target=\"\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1388\" style=\"margin-right: 10px;\" title=\"Internet Connected CIFS\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/1389394753_network.png\" alt=\"Internet Connected CIFS\" width=\"86\" height=\"86\"><\/a>One of the most interesting things about Stuxnet, is that it attacked an unconnected (to the internet) system and it\u2019s commonly thought that an insider infected the Siemens-based control systems with a USB drive. However, the worm also existed \u2018in the wild\u2019 before being picked up by the AV companies. The plant systems were not connected to the net, as many IPCs aren\u2019t, but it didn\u2019t stop them becoming infected.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">One way to help ensure that your legacy IPCs are protected is with the use of Common Internet File System (CIFS) monitoring, which can take snapshots of Windows and Linux-based systems regularly in order to pick up any changes in the file system.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">According to <a href=\"http:\/\/www.ecnmag.com\/articles\/2013\/11\/protecting-industrial-pcs-early-discovery-and-containment-cifs-monitoring\" rel=\"nofollow\" target=\"_blank\">ECN\u2019s Dan Schaffer<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, \u201cAn industrial security device with CIFS monitoring capability can alert the engineering staff of a possible malware infection on day zero, even if the malware was previously unknown.\u201d<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">This means that <a href=\"\/help\/latestsmhelp.aspx?page=monitor_file_directory_change.aspx\">CIFS monitoring<\/a> is a viable alternative and\/or addition to AV products when it comes to protecting legacy IPCs. It warns if any system files have been altered, deleted or added and alerts the relevant member of staff to the problem so that they can take immediate action. This means that even zero-day exploits can be discovered quickly and dealt with before doing any serious damage.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Further advantages include:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Updates are unnecessary<\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Can be used for Windows or Unix systems<\/span><\/li>\n<li><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Uses a single license<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><span style=\"color: #008000;\"><strong>Should you use CIFS Monitoring as a Stand-Alone Solution?<\/strong><\/span><\/span><\/h2>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">There\u2019s nothing to stop you doing this and it\u2019s a very effective solution, but in the modern world, where we are continuously playing a game of keep up with cyber threats, then a layered approach is sensible. This can include hardware firewalls, as well as AV solutions to work alongside the CIFS monitoring software.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">These threats are becoming increasingly sophisticated and those with legacy IPCs, or indeed consumer PCs that they use for work should strongly consider a solution that can alert you to a problem as soon as it occurs. While it <em>is<\/em> a \u201creactive\u201d solution, it\u2019s really one of the only options open to those with legacy IT products.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><span style=\"color: #008000;\"><strong>Why Choose CIFS Monitoring?<\/strong><\/span><\/span><\/h2>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a title=\"\" href=\"\/blog\/wp-content\/uploads\/2014\/01\/1009934_61187394.jpg\" target=\"\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-1389\" style=\"margin-right: 10px;\" title=\"Why Choose CIFS Monitoring\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/1009934_61187394-150x150.jpg\" alt=\"Why Choose CIFS Monitoring\" width=\"83\" height=\"83\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/1009934_61187394-150x150.jpg 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/1009934_61187394-300x300.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/1009934_61187394.jpg 500w\" sizes=\"auto, (max-width: 83px) 100vw, 83px\"><\/a>Security is paramount of course, but it\u2019s also worth remembering that should you keep customer records on your network, then a hefty fine will be applied should you fail to protect customer details adequately. This is especially true if you process customer payments using credit cards such as Visa and American Express.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"http:\/\/usa.visa.com\/merchants\/risk_management\/cisp_tools_faq.html?it=il|\/business\/accepting_visa\/ops_risk_management\/cisp.html|PCI%20Data%20Security%20Standard\" rel=\"nofollow\" target=\"_blank\">PCI compliance <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>will be examined when it comes to audit time and many companies fail in this and find themselves in a whole heap of trouble, financially. In fact, many businesses that fail to put security and backup measures in place fail within 6 months of an IT disaster occurring.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Of course software and hardware monitoring can also protect against potential problems that may be about to occur, such as drive failure and it\u2019s always wise, if not essential, to have a good disaster recovery plan which allows for the worst.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><span style=\"color: #008000;\"><strong>Is CIFS monitoring Difficult to Set up?<\/strong><\/span><\/span><\/h2>\n<p><span style=\"font-size: 12pt; font-family: verdana,geneva;\"><a title=\"\" href=\"\/blog\/wp-content\/uploads\/2014\/01\/Is-CIFS-Monitoring-Difficult-2.jpg\" target=\"\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1390 alignright\" style=\"margin-left: 20px; border: 2px solid slategray;\" title=\"Is CIFS Monitoring Difficult\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/Is-CIFS-Monitoring-Difficult-2-300x187.jpg\" alt=\"Is CIFS Monitoring Difficult\" width=\"204\" height=\"129\"><\/a><\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Not especially, like any software program it will of course depend on your specific needs. File extensions can be specified, such as .exe, .scr and so on and you can add files that need to be monitored closely that are specific to your organization. You can monitor entire directories as well as file types and even sub-directories if absolutely necessary.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Likewise, for those files that change often as a natural part of business operations, then these can be excluded from alerts during scans. In fact, you can even \u2018train\u2019 monitoring software so that, much like speech-recognition software, it comes to know what to expect when any changes occur and what action should be taken.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><span style=\"color: #008000;\"><strong>Back to Security<\/strong><\/span><\/span><\/h2>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">It\u2019s a sad fact that we\u2019re playing an ongoing game of chase when it comes to IT security threats, both from a business and consumer point-of-view. As well as implementing monitoring software, firewalls and AV solutions, it\u2019s really also necessary to train staff.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">A large majority of end-users aren\u2019t security savvy and this leads to problems within the enterprise. However, this needn\u2019t be the case if training is put in place alongside strict policies. Phishing and social engineering remain common tactics and many of these are sophisticated enough to get past the average user.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Recently, we\u2019ve seen a rise in phishing attacks purporting to be from the IRS, payroll or even company complaints and these pretty much always come in via a zip attachment. Social media is also responsible for many infections, so it pays to develop security policies which should be delivered alongside training.<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">Social media is also something that is valuable both in the intranet and outside, so it\u2019s important that staff know the dangers. It\u2019s equally important that if you run a BYOD scheme that strong policies surround this also, as these are high-risk areas (think Stuxnet again, although that was deliberate sabotage).<\/span><\/p>\n<p style=\"color: #000000; font-family: arial, helvetica, sans-serif; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;\"><span style=\"font-size: 12pt; font-family: verdana,geneva;\">CIFS monitoring is an ideal solution for those that retain legacy products. While in an ideal world we would all simply upgrade to the latest versions, this is easier said than done for many companies. The cost involved can be more than substantial and even if the cloud is chosen as an alternative or additional solution, deployment can be a time-consuming and difficult process that needs the help of experts. Whatever the case, security for all businesses in the connected world is vital and something that cannot be ignored.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><em>Image Credits<\/em><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><em>By Condorchem (Own work) [CC-BY-SA-3.0 (http:\/\/creativecommons.org\/licenses\/by-sa\/3.0)], via <a href=\"http:\/\/upload.wikimedia.org\/wikipedia\/commons\/6\/66\/Vacuum_evaporators.jpg\" rel=\"nofollow\" target=\"_blank\">Wikimedia Commons<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/em><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><em>Photo Credit: <a href=\"http:\/\/www.flickr.com\/photos\/61020194@N04\/11338314263\/\" rel=\"nofollow\" target=\"_blank\">PresseBox.de flickr<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> via <a href=\"http:\/\/compfight.com\" rel=\"nofollow\" target=\"_blank\">Compfight<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> <a href=\"http:\/\/www.flickr.com\/help\/general\/#147\">cc<\/a><\/em><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a title=\"\" href=\"http:\/\/www.twitter.com\/home?status=RT:%20@poweradmn%20The%20Death%20of%20Windows%20XP%20and%20CIFS%20Monitoring%20\/blog\/the-death-of-windows-xp-and-industrial-pc-security\/?ref=blog\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1028\" title=\"Tweet this\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png\" alt=\"Tweet this\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a title=\"\" href=\"https:\/\/plus.google.com\/share?url={\/blog\/the-death-of-windows-xp-and-industrial-pc-security\/?ref=blog}\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1053\" title=\"Share on Google+\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png\" alt=\"Share on Google+\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CIFS \u2013 How to Protect Legacy Industrial PCs (IPCs) Before the popularity of cloud began to take over, the only choice that companies large and small had with regard to IT infrastructure, was to build their own network. This of course consisted of servers, web servers and workstations, all connected together for the purposes of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1415,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,9,8],"tags":[],"class_list":["post-1362","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=1362"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1362\/revisions"}],"predecessor-version":[{"id":6855,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1362\/revisions\/6855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/1415"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=1362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=1362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=1362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}