Securing your company’s network consists of:
(1) identifying all devices and connections on the network;
(2) setting boundaries between your company’s systems and others
(3) enforcing controls to ensure that unauthorized access, misuse, or denial-of-service events can be thwarted or rapidly contained and recovered from if they do occur.
►Cyber Plan Action Items
1. Secure Internal Network And Cloud Services
Your company’s network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls and web filtering proxies.
♦ Internal Network
After identifying the boundary points on your company’s network, each boundary should be evaluated to determine what types of security controls are necessary and how they can be best deployed.
Border routers should be configured to only route traffic to and from your company’s public IP addresses, firewalls should be deployed to restrict traffic only to and from the minimum set of necessary services, and intrusion prevention systems should be configured to monitor for suspicious activity crossing your network perimeter.
In order to prevent bottlenecks, all security systems you deploy to your company’s network perimeter should be capable of handling the bandwidth that your carrier provides.
♦ Cloud Based Services
Carefully consult your terms of service with all cloud service providers to ensure that your company’s information and activities are protected with the same degree of security you would intend to provide on your own.
Request security and auditing from your cloud service providers as applicable to your company’s needs and concerns.
Review and understand service level agreements, or SLAs, for system restoration and reconstitution time. You should also inquire about additional services a cloud service can provide. These services may include backup and- restore services and encryption services, which may be very attractive to small businesses.
2. Develop Strong Password Policies
Generally speaking, two-factor authentication methods, which require two types of evidence that you are who you claim to be, are safer than using just static passwords for authentication.
One common example is a personal security token that displays changing pass-codes to be used in conjunction with an established password. However, two-factor systems may not always be possible or practical for your company.
Password policies should encourage your employees to employ the strongest passwords and passphrase possible without creating the need or temptation to reuse passwords or write them down.
That means passwords that are random, complex and long , at least 12 characters, that are changed regularly, and that are closely guarded by those who know them.
3. Secure And Encrypt Your Wi-Fi
♦ Wireless Access Control
Your company may choose to operate a Wireless Local Area Network (WLAN) for the use of customers, guests and visitors. If so, it is important that such a WLAN be kept separate from the main company network so that traffic from the public network cannot traverse the company’s internal systems at any point.
Internal, non-public WLAN access should be restricted to specific devices and specific users to the greatest extent possible while meeting your company’s business needs.
Where the internal WLAN has less stringent access controls than your company’s wired network, dual connections — where a device is able to connect to both the wireless and wired networks simultaneously — should be prohibited by technical controls on each such capable device (e.g., BIOS-level LAN/WLAN switch settings). All users should be given unique credentials with preset expiration dates to use when accessing the internal WLAN.
♦ Wireless Encryption
Due to demonstrable security flaws known to exist in older forms of wireless encryption, your company’s internal WLAN should only employ Wi-Fi Protected Access 2 (WPA2) encryption.
4. Encrypt Sensitive Company Data
Encryption should be employed to protect any data that your company considers sensitive, in addition to meeting applicable regulatory requirements on information safeguarding. Different encryption schemes are appropriate under different circumstances.
However, applications that comply with the Open PGP standard, such as PGP and GnuPG, provide a wide range of options for securing data on disk as well as in transit.
If you choose to offer secure transactions via your company’s website, consult with your service provider about available options for an SSL certificate for your site.
5. Regularly Update All Applications
All systems and software, including networking equipment, should be updated in a timely fashion as patches and firmware upgrades become available. Use automatic updating services whenever possible, especially for security systems such as anti-malware applications, web filtering tools and intrusion prevention systems.
6. Set Safe Web Browsing Rules
Your company’s internal network should only be able to access those services and resources on the Internet that are essential to the business and the needs of your employees.
Use the safe browsing features included with modern web browsing software and a web proxy to ensure that malicious or unauthorized sites cannot be accessed from your internal network.
7. If Remote Access Is Enabled, Make Sure It Is Secure
If your company needs to provide remote access to your company’s internal network over the Internet, one popular and secure option is to employ a secure Virtual Private Network (VPN) system accompanied by strong two-factor authentication, using either hardware or software tokens.
8. Create Safe-Use Flash Drive Policy
Ensure employees never put any unknown flash drive or USBs into their computer. Set a policy that employees know they should never open a file from a flash drive they are not familiar with and should hold down the Shift key when inserting the flash drive to block malware.
Traffic Inspector An integrated gateway solution for controlling access to the Internet and for providing data transmission services. The product contains: a proxy server that provides caching and blocks unwanted resources; a simple and secure firewall to protect against network attacks; a billing system; accounting for all types of traffic (through the proxy server, the mail gateway, and NAT); a system for the dynamic control of speed and sessions; blocking of excessive network activity; diversion and routing of traffic; mail gateway; integration with Active Directory; secure authorization; web server statistics; remote access; reports.
- A Role-Based Trusted Network Provides Pervasive Security and Compliance – interview with Jayshree Ullal, senior VP of Cisco
- Dave Dittrich, Network monitoring/Intrusion Detection Systems (IDS), University of Washington.
- “”Honeypots, Honeynets””. Honeypots.net. 2007-05-26. Retrieved 2011-12-09.
- Case Study: Network Clarity, SC Magazine 2014
- Cisco. (2011). What is network security?. Retrieved from cisco.com
- Security of the Internet (The Froehlich/Kent Encyclopedia of Telecommunications vol. 15. Marcel Dekker, New York, 1997, pp. 231–255.)
- Introduction to Network Security, Matt Curtin.
- MPLS, SD-WAN and Network Security’, Yishay Yovel.
Anti-Virus / Anti-Malware Solutions: