With over 50 years of experience in network and firewall management, we are constantly training and learning to stay ahead of the latest technology trends.
Our Security Newsroom serves to keep our clients up-to-date with cutting edge network security developments by teaching them the basics, providing presentations and articles authored by our network engineers, and giving you access to various resources that shape our industry.
What are the Security Threats?
External threats can be from hackers, or increasingly from cybercriminals who are looking to profit from the information obtained from your company. This information can be obtained by complex social engineering schemes where employees are conned into providing confidential data to 3rd parties (phishing, phone scams). Hackers also can gain access from newly discovered vulnerabilities in firewalls, operating systems and applications.
Internal threats come primarily from employees, consultants or partners with inside access to your network. These vulnerabilities may be unintentional, but frequently stem from unauthorized access to company or customers confidential data. Other forms of risk include lost or stolen laptops or unsecured remote access to your network.
What in Your Company Needs to be Secured?
Creating a secure environment involves a multi-layered security approach. Security begins with an understanding of your organization and its goals, plans, policies, processes, and IT and people infrastructure. Therefore securing begins with a security plan, policies, and processes.
The network infrastructure that must be secured includes: 1) the internet gateway (restricting unauthorized access and harmful content), 2) Servers including application, Web, FTP, mail and file, 3) Clients including PCs, mobile clients, wireless, and PDAs, 4) securing remote access, 5) Data and system backup and catastrophe planning, 6) VOIP phone systems.
What is Best Practices Security?
While there are many security standards, laws and regulations, when overlaying the requirements on top of each other, it is interesting to note that most have common set of requirements. By using a high standard to make sure that your organization is secure, you provide the groundwork for meeting any standard for security even if your goal is just to be “secure enough”.
Best Practices Security involves using a risk management process to identify, measure, control and minimize loss associated with uncertain events or risks. Best practices security begins with an understanding or your organization, when adding the use of network risk assessment tools, a view of your risks and appropriate strategy can be formulated. Recommendations will fall into several categories: 1) secure network and IT infrastructure, policies, processes, guidelines, data integrity and continuity (catastrophe planning), access control, monitoring schedules and methods and training.