Sunday, 27 August 2017
Top Tips to Achieve Network Security
Each year, attacks on cyber networks have resulted in the loss of crucial data costing businesses billions. Creating layers of protection or a “defense-in-depth” approach can help provide a sound strategy for network security. This approach uses multiple devices, products and procedures rather than relying on a single method to enforce security. Some tips:
Use strong authentication methods – In four out of five instances, stolen credentials are the culprits of security breaches. Traditional user names and passwords are not secure and no match for today’s sophisticated hackers.
Upgrade software with latest security patch – No matter how big or small the fix, software security patches are important. A machine that is not updated with the latest security fix is much more likely to have software vulnerabilities that can be exploited by the latest virus or malware.
Physically secure equipment and ports – If your computer equipment is not suitably protected, it is easy for criminals to either steal data or infect your computers and network without needing to go online.
Establish cyber security rules for your employees – Create awareness on the important role they play in security.
Encrypt data and require users to enable bios passwords
Protect devices against viruses, spyware, and other malicious code
Protect and secure external network access – Ensure that the network is using secured Virtual Private Network (VPN) technology to create secure Internet connections to and from the private networks.
Perform regular internal security audits and plan for improvements – Regular security audits, at the very least on an annual basis, will help measure the organization’s current security policy and operations against potential threats.
Define strong security rules for administrator accounts – Implement strong authentication for admin accounts and ensure login credentials are not shared.
Don’t forget about mobile and BYOD – While the BYOD trend will continue to be fueled by user demand, it presents both opportunities and challenges. Tightly examine your organization’s specific situations and use cases and set appropriate policies to address this growing trend.