Before you go and spend a ton of money on some “next-gen” network security solution, make sure you have the fundamentals locked down. Nearly one-third of businesses suffered a data breach in the last year, many of which were caused by common mistakes like:
If you can avoid these mistakes, you make your organization a much less enticing target for hackers. In this post, we’ll walk through these and other network security fundamentals, and offer tips for making sure your data doesn’t end up on the dark web.
Out of convenience, employees will use simple passwords, or use the same password across multiple accounts. Both of these types of weak passwords put your organization at risk.
A determined hacker can bypass a weak password, and if that password works across other accounts for the same user, that hacker is going to be all over your network in a matter of minutes.
Here are some simple steps you can take to decrease the chances that people are using risky passwords:
Solving this network security risk is not complicated, but it takes will to drive this policy across the organization. Simply emailing employees a password policy is not enough — someone has to own this responsibility and make sure that it is enforced.
Software update notifications can come at inconvenient times, so it’s very common for people to put them off to avoid disrupting their work. Unfortunately, outdated systems invite ransomware attacks — it’s like leaving the door wide open.
The saddest part is that these types of network security breaches are 100-percent preventable. Keep all software up-to-date and patch all known vulnerabilities. If you don’t, a hacker can exploit the weakness to gain access to your network.
To address this problem, remember the following:
The “human-layer” of network security should not be an afterthought. You can do everything right on the technical side, but if some employee downloads an unsafe attachment, the entire network can still be compromised.
Some of the costliest ransomware crimes in history have been the result of a low-tech phishing email. Hackers are resourceful, they are going to use all the tools at their disposal to get on to a network they can exploit for gain.
What do employees need to know if they are logging into their company accounts in a coffee shop or hotel room? Have they been trained on how to keep themselves and the business safe on public Wi-Fi?
A naive employee can put your business at serious risk by taking an innocent-seeming shortcut, trying to catch up on work from home, or storing a file in the wrong place. It’s essential that they receive some training in digital security fundamentals.
Here’s how to start bringing people up to speed:
SEE: How to Create an Effective Cybersecurity Awareness Program from TechRepublic Premium
Allowing users to have privileges greater than what their role requires is a disaster waiting to happen.
One, you open the door to an insider network security threat where excessive privileges result in an employee causing a data breach, data corruption, or worse. Whether the employee is malicious, negligent, or idiotic doesn’t really matter. The damage is done.
Two, if a hacker gains control of an over-privileged account, it’s going to be easy for them to move laterally across systems and exfiltrate data — all while bypassing the access control mechanisms you have in place.
When access control rules are too loose, it increases the chances of an accident or attack, and makes the potential severity of either much worse.
To clamp down on excessive privileges and improve network security:
Managing your network security is essential for protecting your company’s digital assets. If you are starting from scratch, take these practical steps:
Maintaining a strong network security posture is an ongoing battle. These three steps are just the basics. Follow the links for more detailed coverage of each topic.
Think of a network firewall as a security guard for your computer network. It checks all the data coming in and going out, ensuring nothing harmful gets through. Without a firewall, your network is left wide open to all kinds of cyber threats, which can lead to your data being stolen.
Hardware firewalls are physical devices that sit between your network and your connection to the internet; these firewalls are great for protecting an entire network. You can purchase them from computer hardware retailers or online stores like Amazon, Best Buy, or Newegg.
Software firewalls are installed on individual devices. Many operating systems come with built-in software firewalls like Windows Firewall, but you can also buy more advanced ones from software companies or download free versions from providers such as Norton or McAfee.
Both hardware and software firewalls are still in use today, and these two categories can be further broken down into eight types of firewalls that each have a specific purpose. To fully protect your network and ensure that legitimate users won’t get blocked, you will have to create firewall rules.
Next, put antivirus and anti-malware software on all workplace devices. This is your main defense against nasty things like viruses and ransomware.
Pick a good antivirus software and make sure it updates on its own to stay ahead of new threats. Also, regularly scan your devices to catch and remove any bad software.
Malwarebytes is a reputable provider of free anti-malware software, and Norton is known for its antivirus software.
If anyone on your team works remotely, having a Virtual Private Network (VPN) is essential for maintaining security and privacy. A VPN creates a secure and encrypted connection over the internet, which is especially important when using public or unsecured Wi-Fi networks.
This encrypted tunnel ensures that the data you send and receive is shielded from prying eyes, making it difficult for cybercriminals to steal it.
To find the best VPN provider for you, keep an eye out for the following key features:
When your data is encrypted, it’s scrambled into a code that can’t be read by anyone who doesn’t have the key to decode it. It’s important for your business to encrypt sensitive data both in transit (when it’s being shared) and at rest (when it’s being stored).
Here’s how to apply encryption to different types of data.
Multi-factor authentication is like a double-check for security. Along with a password, this form of authentication asks for something else before granting account access, such as a code from an alternative contact method or a fingerprint.
Put MFA in place at your business — especially for getting into your most critical systems — and you’ll cut down the risk of someone sneaking in. Even if someone malicious gains control of an employee device, for example, MFA will prevent them from gaining access to your network.
Securing your system is just the first step in protecting your business from cybersecurity threats. You’ll also need to have several ongoing practices to maintain your network’s security.
Employees that work from home, hotels, and airports drastically increase the potential attack surface for their organization.
It’s important to train employees how to stay secure and provide the technical support to do so. Here are three of the biggest remote work security challenges, and how to respond: