Keylogger

Keylogger

Software vs. hardware based

Risk of keyloggers

Protecting agains keyloggers

  1. Perform regular updates and patches
    • Your organization needs to assure that known vulnerabilities are not being excluded by a keylogger.
  2. Rely on quality antivirus and anti-malware solutions
    • Detect and quarantine any keylogger software that may be installed on your system
    • Conduct regular scans
  3. Conduct phishing awareness training for your users
    • Be cautions when downloading from untrusted senders
  4. Implement multi-factor authentication systems
    • Even if password was captured, the threat actor would be unable to access your account since he needs an additional factor
  5. Encrypt keystrokes being sent to your systems
    • Protect your system by implementing keystroke encryption
  6. Perform physical checks of your desktops, laptops, and servers
    • Regularly inspect system hardware to detect devices like hardware keyloggers