The end of Microsoft supporting its Windows Server 2003, meaning Microsoft will stop issuing patches for the platform leading to security holes that businesses will be unable to patch and close. Please find below the following comment from Karl Sigler, Trustwave Threat Intelligence Manager as he highlights what businesses should be doing to ensure they don’t fall victim to a data breach, due to an end of life server.
Karl Sigler, Threat Intelligence Manager, at Trustwave :
“In addition to “ringfencing” or additional network segmentation of Server 2003 systems, exploit and malware filtering can provide an additional layer of protection. Anti-malware gateways can filter exploits before they even reach your servers. This concept is generally known as “virtual patching”. By blocking an exploit with a gateway device like a WAF or a Secure Email Gateway, you’re not as dependent on the physical patches that Server 2003 will be missing.
Network monitoring is also an important security step in this situation. By not upgrading Server 2003, your organisation will be taking on more risk with every vulnerability that goes unpatched. Monitoring your network for anomalous or strange traffic can be a crucial tool for identifying and containing a breach.”[su_box title=”About Trustwave” style=”noise” box_color=”#336588″]