When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Its also extremely valuable to cybercriminals.

Attacks that exploit zero-day vulnerabilities cannot be prevented but they can be faced with confidence.

An abstract image of a lock against a digital background, denoting cybersecurity.

(Image Credit: TheDigitalArtist / Pixabay)

Resident CISO EMEA and VP of Security Research at Netwrix.

Another critical best practice is configuring stringent access controls that adhere to the least privilege principle.

Such an approach further limits the ability of an adversary to escalate privileges.

Software vendors usually quickly provide a security patch or mitigation strategy.

Accordingly, a robust patch management strategy is another vital element in reducing the attack surface area.

That strategy should include scanning systems for unpatched vulnerabilities so they can be mitigated promptly.

One option is a traditional patch management tool that scans systems regularly.

Signs of these threats include unusual login attempts, suspicious access requests and unplanned changes to privileges.

Detection of a threat can trigger automated responses like blocking access and resetting credentials.

Organizations also need an endpoint detection and response (EDR) system.

EDR complements ITDR by monitoring endpoints for potentially malicious activity and enabling prompt response to those threats.

We’ve rated the best identity management software.

The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.

If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro