Monday, 11 September 2017 10:33

IT DEFENSE IN DEPTH PART II

Written by
Rate this item
(0 votes)

 

 

In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses. The human layer refers to the activities that your employees perform. 95% of security incidences involve human error. Ashley Schwartau of The Security Awareness Company says the two biggest mistakes a company can make are “assuming their employees know internal security policies" and “assuming their employees care enough to follow policy”.

Here are some ways Hackers exploit human foibles:

  • Guessing or brute-force solving passwords
  • Tricking employees to open compromised emails or visit compromised websites
  • Tricking employees to divulge sensitive information

For the human layer, you need to:

  • Enforce mandatory password changes every 30 to 60 days, or after you lose an employee
  • Train your employees on best practices every 6 months
  • Provide incentives for security conscious behavior.
  • Distribute sensitive information on a need to know basis
  • Require two or more individuals to sign off on any transfers of funds,
  • Watch for suspicious behavior

The network layer refers to software attacks delivered online. This is by far the most common vector for attacks, affecting 61% of businesses last year. There are many types of malware: some will spy on you, some will siphon off funds, some will lock away your files.

However, they are all transmitted in the same way:

  • Spam emails or compromised sites
  • “Drive by” downloads, etc.

To protect against malware

  • Don’t use business devices on an unsecured network.
  • Don’t allow foreign devices to access your wifi network.
  • Use firewalls to protect your network
  • Make sure your Wi­Fi network is encrypted.
  • Use antivirus software and keep it updated. Although it is not the be all, end all of security, it will protect you from the most common viruses and help you to notice irregularities
  • Use programs that detect suspicious software behavior

The mobile layer refers to the mobile devices used by you and your employees. Security consciousness for mobile devices often lags behind consciousness about security on otherplatforms, which is why there are 11.6 million infected devices at any given moment.

There are several common vectors for compromising mobile devices

  • Traditional malware
  • Malicious apps
  • Network threats

To protect your mobile devices you can:

  • Use secure passwords
  • Use encryption
  • Use reputable security apps
  • Enable remote wipe options.

Just as each line of defense would have been useless without an HQ to move forces to where they were needed most, IT defense-in-depth policy needs to have a single person, able to monitor each layer for suspicious activity and respond accordingly.

Read 3078 times Last modified on Monday, 11 September 2017 10:47
Jordon Darling - CISSP

Jordon is the President/CEO of  HITECH. He is a business minded security professional who has a passion for people and small business.  Some of his certifications include: CISSP, CSSA, MCPS, MCNPS, MS, SA

101 comments

  • Comment Link Cecile Friday, 22 February 2019 00:43 posted by Cecile

    Right his very second you could be getting laid. Think about that for a moment.
    You could be having sex instead of jerking off.
    Go to http://getlaid.xyz and find yourself a woman who wants to fuck.
    You’ll be surprised when you’re balls deep inside a pretty princess.

  • Comment Link Luther Thursday, 21 February 2019 23:46 posted by Luther

    Very great post. I just stumbled upon your blog
    and wanted to mention that I've really loved surfing around
    your blog posts. After all I'll be subscribing on your rss feed and
    I'm hoping you write once more very soon!

  • Comment Link Magnolia Thursday, 21 February 2019 22:03 posted by Magnolia

    My spouse and I absolutely love your blog and find
    a lot of your post's to be exactly what I'm looking for.
    Would you offer guest writers to write content to suit your needs?
    I wouldn't mind producing a post or elaborating on a number of the
    subjects you write regarding here. Again, awesome website!

  • Comment Link Ernestine Thursday, 21 February 2019 05:17 posted by Ernestine

    Wonderful goods from you, man. I have understand your stuff previous to and you are just too magnificent.
    I actually like what you've acquired here, really like what you are stating and the way in which you say it.
    You make it enjoyable and you still care for to keep it sensible.

    I can't wait to read far more from you. This is really
    a terrific web site.

  • Comment Link Fernando Wednesday, 20 February 2019 17:56 posted by Fernando

    Great web site. Plenty of useful information here.

    I am sending it to a few pals ans additionally sharing in delicious.
    And naturally, thank you to your effort!

  • Comment Link Ralf Wednesday, 20 February 2019 08:19 posted by Ralf

    If you wish for to improve your knowledge only keep visiting this
    web site and be updated with the most recent news update posted here.

  • Comment Link Kai Tuesday, 19 February 2019 17:50 posted by Kai

    Thanks for finally writing about >IT DEFENSE IN DEPTH PART II Loved it!

  • Comment Link Amy Friday, 15 February 2019 13:56 posted by Amy

    Are you the kind of guy who likes to talk to sexy girls? If so,
    then you’re really going to love http://bestcamsite.xyz There are so many girls at that site.
    Day or night, you’ll always find a hot horny girl to talk to
    there.

  • Comment Link Mercedes Friday, 15 February 2019 05:27 posted by Mercedes

    Are you searching for love? Have you tried unsuccessfully to meet the person of your dreams at other sites?
    Almost all of those dating sites are a waste of your time.

    Check out http://bestonlinedating.xyz and see
    what the difference is. It’s full of good looking women who are searching for
    Mr. Right. Join today and be prepared to live happily ever after.

  • Comment Link Carlton Thursday, 14 February 2019 01:31 posted by Carlton

    The cutest cam girls are just one click away.
    These are girls who will make your dick hard instantly. Visit http://cutecamgirls.xyz and start talking to these girls.
    You’ll be surprised when they show you their tits. Nothing is better than talking
    to girls who get totally naked right before your very eyes.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.