Whitepaper

Improve security by optimizing your reboot strategy

Many  computer changes we make for security reasons are not effective until the  computer is rebooted (restarted). However, reboots require all the software on  the computer to be shut down. This leads to some key challenges:

  • There is a danger that as the software is shut down, any unsaved data or document changes might not be saved
  • In almost all cases the user will have to start their applications again as needed, reopen the documents, and reposition the application windows
  • If the user was in the midst of a task, that task will be delayed while the computer reboots
    1. The task might be particularly time critical
    2. The interruption might be embarrassing to the user
  • The user might have had a bad experience with a previous reboot and thus fear this reboot could be problematic

For these reasons, computer administrators and end-users often hesitate to force reboots. Computers are commonly left vulnerable for weeks as reboots are delayed and thus the security improvements are not effective. In this paper we will:

  • Review core concepts related to reboot strategies
  • Detail reboot options
  • Outline the process to review your strategy and optimize it

Fill in the form to download the whitepaper

Share this post

Share this post on your favourite social media platform.

Find this resource useful?

If so please click here

Related Content

On-demand Webinar

Improving the Incident Response Function: SANS 2018 Incident Response Survey Results Part 2

Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence--73 percent of respondents to last year's survey said they were using…

On-demand Webinar

How Are You Responding to Threats: SANS 2018 Incident Response Survey Results Part 1

What new and continuing threats are responders uncovering in investigations, and how are they dealing with those threats? This webcast will release results from the SANS 2018 Incident Response Survey, developed by Matt Bromiley, SANS Digital Forensics and Incident Response…

Case Study

Uncle SAM: How AppClarity saved the US taxpayer millions at a leading federal agency

This US federal agency lacked the insight into their software estate required to manage their licenses. AppClarity was the answer to their troubles.

Case Study

Tachyon & ServiceNow: Driving full IT automation (with Nathan Dornbrook, ECS Security)

ServiceNow is an incredible orchestration and automation tool, while Tachyon enables users to execute almost any process on any endpoint. The integration of the two, therefore, is extremely powerful.

About 1E

Cyber security is critical. One breach could destroy your organization’s reputation and cost millions of dollars. We take that threat seriously. 1E gives you unprecedented control and visibility over your full digital estate, delivered at speed and at scale. We’re working towards a world of proactive cyber security, a world where CIOs and CISOs work together to ensure that no threat can bring down their systems.