Network Security: The Secret is in the Layers

Network Security: The Secret is in the Layers

Finding the Sweet spot

The secret to a great lasagna is in the layers; similarly, the ‘sweet spot’ for your business network security is in its layers. In today’s economic climate, you have likely considered this because your business runs on a network that needs to be equipped with adequate protection. Unfortunately, improper network security measures have far-reaching consequences that could damage your reputation, affect finances, and inevitably end your business. Thankfully, the right approach can save your business from more ominous threats. Here are some of our top recommendations for securing your business’ network and viability.

Layering your security network

The term ‘layering of security’ is often used in reference to the defence-in-depth strategy (an approach that employs a layered defence mechanism to protect assets, information, and data). It is recommended that a business deploys the use of more than one layer - either physical, technical, or administrative. Physical security includes anything tangible used to detect unauthorised access to your business's physical areas, such as CCTVS, guards, and staff security badges. Technical security is also referred to as logical controls. It includes hardware or software mechanisms like firewalls, intrusion detection, or even access control lists. Administrative security is the softer side of the layers and includes policies, procedures, and guidelines that define your business practices and operations. One popular example of this layer is security awareness training for employees.

Top tools and techniques to secure your network

Network Segmentation

In network security, whether you have a flat network or a segmented network is of utmost importance. In a flat network, all the systems within can talk to and trust each other. In contrast, in segmented networks, you may have two computers in one segment that don’t necessarily need to trust other computers in the wider network. This prevents the propagation of malware within the network. Protip: take the extra step to pair each segment of your network with firewalls for added security measures.

Data Privacy

In this instance, Data Privacy revolves around protocols that ensure confidentiality and prevent data tampering within a network. A prime example of these measures includes using ‘HTTPS’ throughout your network and using Secure Shell (SSH) instead of Telnet to remote into different terminal devices.

For instance, if you are logging into an intranet portal within your organisation that uses ‘HTTP’ allows an attacker to eavesdrop and easily see your username and password being sent across the network in plaintext. Using ‘HTTPS’ renders that information unreadable to the attacker, so data privacy using encryption technologies is always a plus.

Read The Full Article at Blog.symptai.com

OGECHI O.

I make cybersecurity strategy and tactical operational execution a fit for purpose

4 年

Well said!

要查看或添加评论,请登录

Lomar Lilly的更多文章

  • How Do I Stay Motivated?

    How Do I Stay Motivated?

    Motivation feels good, energising, and drives us to get things done. But it doesn’t always come naturally, and we all…

    8 条评论
  • Don't Be Afraid To FAIL!

    Don't Be Afraid To FAIL!

    A lot of my LinkedIn Connections ask me about the approach I took to prepare for the certification exams I have done…

    3 条评论
  • Cyber Tips: Avoiding Ransomware

    Cyber Tips: Avoiding Ransomware

    Ransomware is one of the biggest cyber threats out there. What it does is it encrypts ALL your data, locks you out and…

    2 条评论
  • Check out my GitHub Repository

    Check out my GitHub Repository

    Hey! If you are interested in seeing projects I've worked on or contributed to just click here and it will take you…

    1 条评论

社区洞察

其他会员也浏览了