Five pillars of a secure network level

Five pillars of a secure network level

Share post

The increased mobile working with the pandemic also poses major problems for network security. It has created new risks and exacerbated existing ones. With five basic principles, IT administrators can increase cyber security at this level.

Several factors are currently endangering network security

  • Rushed home office: According to Bitdefender, every second company had no plans to switch to home office overnight in spring 2020. This was and is all the more critical as it increased the attack surface of the company's IT.
  • Network protocols under attack: According to Bitdefender's Business Threat Landscape Report 2020, many attacks target services that are particularly important for mobile protocols: 48 percent on Server Message Block (SMB) for file, print and other server services, 42 percent on the Remote Desktop Protocol (RDP) and the file Transfer Protocol (FTP).
  • Broader Internet of Things: According to the same report, 20 percent of CIOS and CISOs assume that users install IoT hardware faster than IT can protect it.
  • Weak point employees in the home office: Three in ten CIOs and CISOs fear that employees at home are causing data disclosure.
  • Search for suitable personnel: According to their own statements, 43 percent of those responsible suffer from the global shortage of cyber security experts.

The following recommendations help to increase the network security of companies and to make it secure.

Inventory networks and their components

Before every security strategy, there is a complete inventory of all devices and network components as well as a floor plan of the network infrastructure. Understanding the topology, architecture and geographical distribution of the components helps to develop an effective strategy that is tailored to each network.

The Internet of Things must also be taken into account: If these devices do not support the installation of security clients, protecting them is a task of network security. This applies in the home office, but also especially in industry, medical technology and other sectors.

Segment and segregate networks

Liviu Arsene, Bitdefender

Liviu Arsene, Global Cybersecurity Researcher at Bitdefender (Photo: Bitdefender).

Unsegmented networks may impair data traffic and, on the other hand, offer successful attackers a high degree of freedom of movement. A subdivided network creates more security. Thanks to access control for the individual areas, IT security teams can make unauthorized access to critical areas impossible from the outset. You set security guidelines depending on how critical an area is.

With such network security, attackers can no longer move laterally so easily to access important data. Strict control and visibility in the network also help to identify suspicious or atypical data traffic.

Know how - train employees

Many employees work more carefree at home and do not think about the applicable rules for cyber security. A major danger is the re-selection of previously used passwords that may have been compromised by previous attacks. Companies must therefore train their employees in this above all else. Access data should be unique, complex and at the same time easy to remember. Under no circumstances should users reuse them. Other important topics are the detection of spear phishing and the correct reporting of a suspicious, but often increasingly difficult to unmask e-mail.

Regular and binding company-wide training courses bring employees up to date with the latest technology and the applicable safety policy. This is an important basis: because humans are usually the weakest link in the chain. A company is only as resistant to attacks as the least trained employee.

Be prepared for an emergency

A predefined emergency plan for an emergency can decisively improve the availability of applications and business processes in an emergency. IT and cyber security teams know what to do to identify attacks, contain them and reduce damage. Just as important is the assessment of the damage and the escalation to the responsible teams or decision-makers. After the work, the maneuver criticism follows. The IT managers plan new measures or improve already defined processes.

Take experts on board

Choosing the right security tools is not always easy. Finding the right people for the IT teams is even harder. Cyber ​​security experts are in demand. Even if a company is in the fortunate position of adding staff to its cyber security team with a corresponding budget, it takes time to find the right team members. Many companies are still looking for them.

The faster way to more network security is therefore often outside help. Managed Detection and Response (MDR) service providers have highly specialized threat hunting teams. Their analysts know from experience how cyber criminals operate and which tools they use to attack a company network. They either support the company's own Security Operations Center (SOC) or fully set up cyber defense. This expertise can then be called up at a reasonable price. An external MDR team reacts immediately to attacks according to a preventively established plan. The individual defensive measures are agreed in advance by the customer and the service provider. This not only increases the ability to react: Companies can proactively set up their defenses and avoid greater damage.

So security at the network level plays a crucial role in which many factors come into play. In addition to technology, the human factor will remain decisive in the long term.

More at Barracuda.com

 


About Bitdefender

Bitdefender is a leading global provider of cybersecurity solutions and antivirus software, protecting over 500 million systems in more than 150 countries. Since it was founded in 2001, the company's innovations have consistently ensured excellent security products and intelligent protection for devices, networks and cloud services for private customers and companies. As the supplier of choice, Bitdefender technology is found in 38 percent of security solutions deployed around the world and is trusted and recognized by industry experts, manufacturers and customers alike. www.bitdefender.de


 

Matching articles on the topic

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Vulnerabilities in medical devices

One in four medical devices (23%) has a vulnerability from the US cyber security agency CISA's Known Exploited Vulnerabilities (KEV) catalog. In addition, there are ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more

Solar energy systems – how safe are they?

A study examined the IT security of solar energy systems. Problems include a lack of encryption during data transfer, standard passwords and insecure firmware updates. trend ➡ Read more