It’s not a joke. Most teen-agers by nature are willing to chat with anyone, especially online. DNS servers are the gatekeepers that determine which other servers on the Internet your devices can talk to. What’s the connection? If you want to keep everybody and everything safe, you’d better have a really good idea of who’s talking to whom.
Hackers are poking into every kind of possible vulnerability on enterprise networks, especially DNS servers. They’ve become one of the most popular points of entry for malware. Most IT teams implicitly trust that a query to their DNS server will return a valid response from a safe and secure system, without consideration for the potential security pitfalls. But the typical DNS server does not validate nor secure any requests.
Without proper protection, there’s a chance your DNS server is communicating with compromised web servers, exposing your organization and devices to a broad range of risks such as drive-by downloads, watering hole attacks, or adware with a malicious payload. You wouldn’t leave your teen-ager unsafe, so don’t do the same with your server.
Join John Thompson, Senior Director, Systems Engineering of ThreatSTOP, and Seema Kathuria, Senior Product Marketing Manager of Infoblox on Wednesday, Dec. 9 at 10 a.m. PST/1 p.m. EST for a 30-minute live webinar entitled How to Trust Your DNS Server.
You’ll learn about:
- Specific malware types and attack methods
- Which security controls they bypass
- How to better protect your organization with your DNS servers
DNS servers are a critical element of your infrastructure and require the same, if not more security considerations as other Internet-facing systems in your environment. Learn best practices for providing network-wide protection from hackers and criminals hiding behind DNS. Register here.