You hear about it all the time on TV news, print magazines, and online articles … a new breach, a new attack, a new threat, a new vulnerability.
So, what is SQL and why is it so vulnerable to attack?
To save you and your company from an equally costly breach, there are five best practices you should implement immediately:
(1) authenticate outside of the SQL itself,
(2) remove unnecessary users,
(3) limit privileges,
(4) monitor failed login attempts;
(5) disable unused features or browser services.
Imperva Cyber Security Blog - Five SQL Best Practices
Posted by erikemanuelli under TechnologyFrom http://blog.imperva.com 3147 days ago
Made Hot by: erenmckay on April 9, 2016 4:22 am
Who Voted for this Story
Subscribe
Comments
3147 days ago