12 short tips on how to protect the corporate network

Protection against cyber attacks involves many areas and requires integrated action. If you are responsible for network security, представленные ниже рекомендации для вас. how to protect the corporate network

1. Check your corporate network security

  • Initially, you need to know how much is protected from hacking your system, it will detect potential threats and take the necessary measures.

2. Secure configuration of hardware and software on laptops, workstations and servers

  • Remove the game and unnecessary software, often pre-installed by manufacturers in desktop computers. On the server you want to remove unneeded applications. If your computer needs four applications, must be exactly four, and not even 10 additional.

3. Secure configuration of network devices: firewalls, routers and switches

  • Use ingress and egress filtering – Traffic control on the input and output nodes of the network to remove the packets with fake IP. The configuration should be documented and tested for safety, and any deviations should be recorded.

4. Protection of contact with the Internet

  • Attackers focus on systems, which can be accessed from the Internet. This applies not only in the DMZ systems, but also to users' computers, who use the Internet, eg, browsing web pages, which is associated with downloading files from external servers. Therefore, the use of white and black lists of IDS systems and adjust the control of outgoing traffic. If you do not use egress filtering it increases the danger of attack.

5. management, monitoring and analysis of security audit logs

  • Logs are not created for no reason, lack of security logs allows thief to hide your location or actions on the target computer. Even if the victim knows, that there was a robbery, without full logs will not be able to establish details of the attack. It may even happen, that the attack will pass unnoticed. So make, magazines that are under close supervision, thanks to them you will know, what is happening on your network, You see anomalies or unusual behavior.

6. application Security

  • Use firewalls, monitoring the interaction with web applications, protect applications from attack SQL injection or Cross Site Scripting. To avoid these threats, the software must be carefully checked for security vulnerabilities. In the case of third-party software company should ensure, that the manufacturer has carried out detailed tests of their products safety.

7. Using administrator rights Kontrolyruyte

  • Excessive administrative rights assigned to the user is the most common method of escalating attacks on the corporate network. IT managers need for administrator rights, but not during checking email. Make, they have two separate accounts: one with administrative rights, and the second with limited rights.

8. Access control

  • In many companies, users have access to most network resources. As a result,, if an attacker can break into the user's computer, he can easily gain access to sensitive information. So make, What do you know, what data need to be protected, which holds, who need to access them. Check also, whether there are appropriate mechanisms to restrict access only to authorized users.

9. Continuous detection of vulnerabilities and their removal

  • One method of implementing this suggestion is the use of vulnerability scanners. These funds should be updated on a regular basis and run, because one minor exposure to the next day can be crucial.

10. Monitoring and control of user accounts

  • Attackers regularly find unused user accounts and their hack. Therefore, remove all user accounts, are not being used and create an account off procedure, when an employee leaves the company. It is useful to regular reporting, containing information about the seldom-used accounts, and attempts to access accounts.

11. Protection from malicious software

  • Make, that security software works on all systems and is updated regularly. It is also to change some operating parameters of the system, eg, memory disable the AutoRun feature of mobile devices (CD / DVD и USB).

12. Control wireless devices

  • Most data theft began with, that an attacker gained access to the company network, eg, I am sitting in the car in the parking lot next to the hotel. often, laptops that employees may have been contaminated during business trips, when they come into range of the enemy wireless coverage, which will connect automatically. These infected computers are used later, as so-called backdoors. Therefore, regularly scan the neighborhood in search of enemy access points.

_

Rate article
IT News
Add a comment