Matt Davies Stockton Looks at Ways to Overcome Security Business Challenges

According to Matt Davies Stockton, the threat of cyber-attacks has been consistently on the rise, and this poses security challenges for both regular users and businesses. Moreover, it’s very confusing when there are thousands of different strategies for fighting those challenges. Let’s figure out a few concrete ways to overcome security business challenges.

The Challenges

1. Whitelist apps – Admin accounts hold all the keys and access to one admin login can help attackers to do a lot of damage. Just restricting the number of applications and operating systems that have admin access can help you mitigate risks. However, while you’re trying to avoid malware, trojans, and viruses, you need to use a suite of trusted and reliable programs.

That’s where application whitelisting comes in. It helps you whitelist trusted and approved programs. This, in turn, stops the execution of unapproved or malicious programs including scripts, .exe, and DLL files and installers. The whitelist simply prevents all non-approved apps from executing without restricting the use of reliable and trusted apps. 

2. Configure macro settings in Microsoft Office – Macros are very useful since it allows you to automate many tasks in Microsoft Office. However, they can also allow attackers to exploit your system. This can be easily solved by configuring the macro settings to block unvetted macros from the internet or other untrusted locations. Make sure you change the macro settings to allow macros that are digitally signed and come with a trusted certificate from your organization.

3. Patch apps – If you’ve detected a vulnerability that can be exploited by an attacker, you need to patch applications like web browsers, Microsoft Office, PDF viewers, and Java within 48 hours. This prevents the spread of malicious apps or programs to other systems in the network and prevents the compromise of your entire operation. This should be your top priority so that things get patched even if the vulnerability is leaked to attackers from inside the organization. Try to be as quick as possible. 

4. Patch systems – Similarly, you need to patch up computers as soon as vulnerabilities are detected. This includes operating systems on computers, servers, and network devices. Make sure to use the latest operating system to avoid such instances in the future. Avoid using unauthorized or unsupported versions. 

5. Daily backups – Daily backups of changed or new data to one or multiple secured cloud servers can help you ensure the recovery of crucial information even after your systems are compromised by a security incident. Even if the attackers install ransomware on your systems, you can simply purge the systems, fix vulnerabilities, and recover all the crucial data. When you set up a daily backup, make sure to test the recovery every month.


Matt Davies Stockton suggests that you use the strategies and steps mentioned above to tackle security challenges threatening your business. They can help you protect your intellectual property, keep your business operations private, and prevent leaks of sensitive information.