Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Understanding activity on the network provides information and visibility that can be used to identify potential security incidents. Organizations are advised to log events from devices and review the logged data to provide insight into anomalies or malicious activity. For logging best practices, consult Cisco Guide to Harden Cisco IOS Devices
Network traffic should be monitored for security-related network activity. NetFlow identifies security-related network activity. For NetFlow configuration details, consult Introduction to Cisco IOS NetFlow - A Technical Overview
It is critical to prevent unauthorized direct communication to network devices. Restrict network traffic destined for the network infrastructure to protect against reconnaissance and DoS attacks. For configuration details, consult Protecting Your Core: Infrastructure Protection Access Control Lists
Administrators are advised to monitor affected systems.