Five pillars of a secure network level

Five pillars of a secure network level

Share post

The increased mobile working with the pandemic also poses major problems for network security. It has created new risks and exacerbated existing ones. With five basic principles, IT administrators can increase cyber security at this level.

Several factors are currently endangering network security

  • Rushed home office: According to Bitdefender, every second company had no plans to switch to home office overnight in spring 2020. This was and is all the more critical as it increased the attack surface of the company's IT.
  • Network protocols under attack: According to Bitdefender's Business Threat Landscape Report 2020, many attacks target services that are particularly important for mobile protocols: 48 percent on Server Message Block (SMB) for file, print and other server services, 42 percent on the Remote Desktop Protocol (RDP) and the file Transfer Protocol (FTP).
  • Broader Internet of Things: According to the same report, 20 percent of CIOS and CISOs assume that users install IoT hardware faster than IT can protect it.
  • Weak point employees in the home office: Three in ten CIOs and CISOs fear that employees at home are causing data disclosure.
  • Search for suitable personnel: According to their own statements, 43 percent of those responsible suffer from the global shortage of cyber security experts.

The following recommendations help to increase the network security of companies and to make it secure.

Inventory networks and their components

Before every security strategy, there is a complete inventory of all devices and network components as well as a floor plan of the network infrastructure. Understanding the topology, architecture and geographical distribution of the components helps to develop an effective strategy that is tailored to each network.

The Internet of Things must also be taken into account: If these devices do not support the installation of security clients, protecting them is a task of network security. This applies in the home office, but also especially in industry, medical technology and other sectors.

Segment and segregate networks

Liviu Arsene, Bitdefender

Liviu Arsene, Global Cybersecurity Researcher at Bitdefender (Photo: Bitdefender).

Unsegmented networks may impair data traffic and, on the other hand, offer successful attackers a high degree of freedom of movement. A subdivided network creates more security. Thanks to access control for the individual areas, IT security teams can make unauthorized access to critical areas impossible from the outset. You set security guidelines depending on how critical an area is.

With such network security, attackers can no longer move laterally so easily to access important data. Strict control and visibility in the network also help to identify suspicious or atypical data traffic.

Know how - train employees

Many employees work more carefree at home and do not think about the applicable rules for cyber security. A major danger is the re-selection of previously used passwords that may have been compromised by previous attacks. Companies must therefore train their employees in this above all else. Access data should be unique, complex and at the same time easy to remember. Under no circumstances should users reuse them. Other important topics are the detection of spear phishing and the correct reporting of a suspicious, but often increasingly difficult to unmask e-mail.

Regular and binding company-wide training courses bring employees up to date with the latest technology and the applicable safety policy. This is an important basis: because humans are usually the weakest link in the chain. A company is only as resistant to attacks as the least trained employee.

Be prepared for an emergency

A predefined emergency plan for an emergency can decisively improve the availability of applications and business processes in an emergency. IT and cyber security teams know what to do to identify attacks, contain them and reduce damage. Just as important is the assessment of the damage and the escalation to the responsible teams or decision-makers. After the work, the maneuver criticism follows. The IT managers plan new measures or improve already defined processes.

Take experts on board

Choosing the right security tools is not always easy. Finding the right people for the IT teams is even harder. Cyber ​​security experts are in demand. Even if a company is in the fortunate position of adding staff to its cyber security team with a corresponding budget, it takes time to find the right team members. Many companies are still looking for them.

The faster way to more network security is therefore often outside help. Managed Detection and Response (MDR) service providers have highly specialized threat hunting teams. Their analysts know from experience how cyber criminals operate and which tools they use to attack a company network. They either support the company's own Security Operations Center (SOC) or fully set up cyber defense. This expertise can then be called up at a reasonable price. An external MDR team reacts immediately to attacks according to a preventively established plan. The individual defensive measures are agreed in advance by the customer and the service provider. This not only increases the ability to react: Companies can proactively set up their defenses and avoid greater damage.

So security at the network level plays a crucial role in which many factors come into play. In addition to technology, the human factor will remain decisive in the long term.

More at Barracuda.com

 


About Bitdefender

Bitdefender is a leading global provider of cybersecurity solutions and antivirus software, protecting over 500 million systems in more than 150 countries. Since it was founded in 2001, the company's innovations have consistently ensured excellent security products and intelligent protection for devices, networks and cloud services for private customers and companies. As the supplier of choice, Bitdefender technology is found in 38 percent of security solutions deployed around the world and is trusted and recognized by industry experts, manufacturers and customers alike. www.bitdefender.de


 

Matching articles on the topic

Cyber ​​danger: HTML smuggling

With HTML smuggling, the malicious file is first created on the user's computer. That's why traditional anti-malware programs and sandboxes detect it ➡ Read more

I-Soon: China's state-run foreign hackers exposed 

Internally, it is certainly the biggest betrayal of China: an employee of the I-Soon company revealed data and services ➡ Read more

Growing threats over the last year

In 2023, threats have increased significantly. Attacks via encrypted channels have increased by 24 percent. The manufacturing industry is back on track ➡ Read more

Data protection: trends in 2024

What challenges could companies face in the area of ​​data protection this year? And how can you relate to that? ➡ Read more

These threats have shaped 2023

In 2023, botnets returned from the dead, ransomware actors found creative ways to make money from theft, and threat actors ➡ Read more

FBI, Europol, NCA: APT group LockBit smashed!

According to the authorities, Europol, the FBI and the British NCA have dismantled the APT group LockBit. At least she has ➡ Read more

Phishing, vishing and quishing

In the early days, phishing attacks were often very simple and used legitimate sources of written communication such as email to gain access ➡ Read more

Pawn Storm under the microscope

Pawn Storm (also APT28 or Forest Blizzard) is a group of APT actors who distinguish themselves through persistent repetition in their tactics, ➡ Read more