CYBERSECURITY: DEFENSE STRATEGY FOR 2019 AND BEYOND

Protecting business’ internet-connected systems from malicious outside activity is critical in today’s day and age of cybersecurity. Ever-changing attacks such as phishing, malware, cryptocurrency, and machine-learning artificial intelligence are a few of the outbreaks that target network infrastructures and leave businesses vulnerable. This leaves many owners and influencers wondering, “Where should I put my defenses to prevent and combat these invasions?”

Implementing a three-pronged strategy of Perimeter External Defenses, Internal Network Defenses, and End-User Education Defenses will protect the health, security, and end-user experience of the network and help keep you ‘up and running.’

Perimeter External Defenses are the first way to prevent cyber-attacks from infecting your network.

  • Active Penetration Testing – identify weaknesses through a labor-intensive effort to enter your network as  would be done by a malicious hacker
  • Passive Vulnerability Testing – use advanced software to locate openings/entry points to your network​​​​​​
  • Firewall Monitoring & Maintenance – monitor your firewall 24/7/365 to identify abnormal attacks and            activity, while continuously updating firmware to make firewalls more secure from known threats
  • Secure Wireless Authentication & Remote Access – guard against intrusion via your wireless service, and      setup encrypted network access via secure VPN, Citrix, and RDP protocols for remote users
  • Physical Access Audit – survey buildings/server rooms/work areas to help improve access control​​​​​​​
  • Email Spam Filtering – prevent malicious software from entering through email​​​​​​​
  • Web Content Restrictions – configure and control access to harmful, non-business websites

 

Internal Network Defenses are the second way to thwart cyber-attacks from contaminating your network.

  • Software/Firmware Updates – ensure software is up to date and provide maximum security​​​​​​​
  • Hardware Updates – identify older, out-of-warranty equipment that has become a security risk​​​​​​​
  • Anti-Virus/Malware Protection – perform preventive maintenance via software​​​​​​​
  • Active Intrusion Monitoring – monitor network operations to detect/report malicious activity​​​​​​​
  • Data Backups – have secure backups of data to protect against costly breach outages​​​​​​​
  • Data Loss and Encryption – set up DLP and encryption to protect what and how data can be sent or stored​​​​​​
  • Access/Permission Control – separate groups and roles to increase security and minimize spread of malware​​​​​​​
  • Directory/Folder Segregation – segregate directories and folders to improve security and minimize risk​​​​​​​
  • Mobile Device Control – develop BYOD and mobile use policies that can be backed up with MDC services

End-User Education Defenses are the final way to stop cyber-attacks from invading your network.

  • On-Premise Training – teach employees what they can do to prevent security breaches​​​​​​​
  • IT Policy Procedure – construct and formalize IT Governance​​​​​​​
  • Phishing Awareness Testing – test employees actively and reiteratively to increase awareness of phishing      attacks​​​​​​​
  • Online Webinars – take advantage of targeted security training anytime, anywhere​​​​​​​
  • Password Policies – improve password use policies to increase security with little cost​​​​​​​
  • Safe Internet Email Use – connect safely without having to lessen security or lose control of your data​​​​​​​
  • Dismissal and Equipment Disposal Procedures – protect your network and files during staffing or                    equipment  changes​​​​​​​
  • Safe Wireless Use – avoid public hotspots and ensure safe encryption connections​​​​​​​
  • Security Incident Response – know what to do when you are attacked, this is critical

 

River Run wants you to experience IT at its best and achieve meaningful results. For more info on how to implement a three-pronged defense approach to cybersecurity, call (414) 228-7474.

 


Topics

 

Share this article