The never ending evolution of cyber threats prompts IT security departments to look beyond the process of defending a network they are responsible for; IT techs are now getting more involved in what is termed as computer proactive maintenance.
Highlights of what we share with our readers based on our experice is:
– 20% of companies are still behind security best practices;
– Most companies are not aware that BYOD devices do represent an IT securty risk if they are not properly part of a network policy.
– Some companies believe that the endpoint security protection they have is enough to protect their network from the spread of malware.
IT security community is today facing the following issue: it is not so much important to know anymore what the bad guys are doing out there, but rather, it is more relevant to share insights with our IT peers on the strategies used to defend against threats.
Overall, the topic of securing a network and keeping it safe and sound depends on the timely response of the IT department when the incident occurrs and on the barriers previously established against the incoming threats.
Before securing a network a good assessment is based on the following questions:
1) Where do we have gaps in our cyberthreat defenses relative to other organizations?
2) Are we falling behind the current network security practices?
3) Are we current and up to date with network policy and in providing adequate protection for desktop and mobile users?
4) How does the spending level of our company compare with the investment of our same sized competitors?
After having analyzed and assessed the needs of a network, the IT tech team should investigate how fast it can remediate the existing security gaps. However, establishing effective cybersecurity defenses requires more than simply implementing next-generation technologies designed to detect the latest wave of elusive cyberthreats. Some of the best moves that can be done are:
1) Reducing the numbers of open ports and services that talks to the Internet
2) Using the next generation of UTM and Cloud based firewalls to granularly control access to network and cloud based resources.
3) Eliminating all unnecessary protocols and services running on endpoints, servers and other internal systems.
To stay up to date with the latest security practices, IT departments should also implement network access control and file integrity monitoring, including a periodical full-network scans for vulnerable systems, together with strategies for remediating malware infected devices.