1. Renaming Admins
If an attacker doesn’t know the name of your privileged accounts, they can’t mount a successful password-guessing campaign against them.
A honeypot is any computer asset set up solely to be attacked. When a hacker or malware touches them, they send an alert to the admin so the that the “touch” can be investigated. The shops that use honeypots get notified quickly of active attacks.
Password-protected screensavers are a simple technique for minimizing security risk. If the computing device is idle for too long, a screensaver requiring a password kicks in.
4. Disabling Internet browsing on servers
Most computer risk is incurred by users’ actions on the Internet. Organizations that disable Internet browsing or all Internet access on servers that don’t need the connection significantly reduce that server’s risk to maliciousness.
5. Security-minded development
Any organization producing custom code should integrate security practices into its development process – ensuring that code security will be reviewed and built in from day one in any coding project. Doing so will reduce the risk of exploitation in your environment.