Skip to main content

The report has shown that the recurring port used to carry out an attack includes:

  • Port 22 which correspond to SSH (Secure Shell)
  • Port 80 the HTTP (Hypertext Transfer Protocol)
  • Port 443 the HTTPS (Hypertext Transfer Protocol Secure).

what users should note:

  • It is best to close unused ports.
  • The Organization should install a firewall on every host and monitor.
  • Port traffic must also be filtered at all times.
  • There should be regular port scans.
  • Penetration testing are best practices to help ensure there are no unchecked system vulnerabilities.
  • security across all network ports should include defense-in-depth.

CCG Software solution will help protect your business from cyberattacks

For the ports:

CCG’s NeTERS provides an unprecedented view of internal tracking of these ports and examines in realtime continuous monitoring.

For the programs:  (weak encryption 66% and outdated software 75%)
CCG provides real-time continuous monitoring of the encryptions in use.
For software:

CanSecure detects and identifies outdated software daily compared to 6 months period used by other vulnerability scanners.

CCG brings you this coverage at a very reduced and affordable cost.

Olumide Akinwekomi

Leave a Reply