MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Building a Security Policy

Published on 11 March 15
496
0
4

Having security tools in place is very important in todayâs world, unless of course your business isnât averse to winding up on prime time news to discuss being a part of the latest security breach. Since there arenât many companies that can fit that description, it is that important to have policies and plans in effect to defend company infrastructure, as well as tools and software to make the defense possible. This means that IT management needs to be aware not only of the tools they possess, but also how to use them in the most effective ways to protect employees and clients alike.

Knowing the infrastructure that is in place for the company might sound obvious, but there are many companies that, over time, have built new infrastructure without taking older equipment offline or updating them. This results in not only additional power expenses, but also clear and present dangers to the network as more likely than not these appliances will be weak points in your defenses. To prevent that (and to reduce power costs), built a network map showcasing what connects what and what servers, routers, and other network appliances do what. If no one knows what it does, audit the machine. The machine could be completely abandoned or might have applications that can be virtualized, reducing power costs and consolidating hardware. It's also a good idea to implement colocation services for your hardware, so that mission-critical applications are powered and connected in facilities designed to stay up and running no matter what.

Now that you know what everything in your network is and what it does you can apply the appropriate security measures. This is best managed by utilizing the whitelisting features found in most firewalls. The reason why whitelists work better than blacklists is because new applications (and malware) are created every day, so managing a blacklist is much harder than managing a whitelist. Employees may express concerns that they canât use certain applications, which will be a lot of work once the whitelist is launched, but this helps to curb shadow IT and many other potential sources of breaches so the headache is worth the effort.

Speaking of end users it is important to protect them at the desktop level with some type of anti-virus (AV) solution as well. Using an AV solution alone is asking for trouble since anti-virus wonât do much against attacks to break into the network, but used in combination with a firewall it will help to defend against that many more types of attacks. In combination with application control and intrusion prevention services (designed to stop attacks on said network) that most business grade firewalls have, you will have the basis for a secured network at both the end point and the network edge.

Of course, keeping that network secured requires maintenance. Running network penetration tests on a regular basis are good because they help you to find problems before the bad guys do, and updating applications goes without saying. This is a common weak point as it is difficult to stay on top of every server to make sure it is updated, but most attacks tend to come in from application exploits, such as Heartbleed and Shellshock did when they were found earlier this year. By being diligent about keeping applications updated, you are able to preemptively solve most of these problems without having to hear on the news about the newest big, bad exploit. Also be sure to make extra sure that you are protected against said big, bad exploit â it never hurts to be sure!

Finally, make sure that your end users know what they can and cannot do with their work equipment and BYOD devices. Having policies against tools such as DropBox and flash drives can help to stymy attacks from the inside, as well as protecting against infected applications that the user might have at home, and wherever applicable be sure to share the company-approved version with your end users so that they can stay compliant with your policies. Users might express some concerns, and at this point management can determine with IT whether the employee benefits of certain applications outweigh potential security risks â this will vary from company to company so the conversation needs to be had for each specific case.
Having security tools in place is very important in todayâs world, unless of course your business isnât averse to winding up on prime time news to discuss being a part of the latest security breach. Since there arenât many companies that can fit that description, it is that important to have policies and plans in effect to defend company infrastructure, as well as tools and software to make the defense possible. This means that IT management needs to be aware not only of the tools they possess, but also how to use them in the most effective ways to protect employees and clients alike.

Knowing the infrastructure that is in place for the company might sound obvious, but there are many companies that, over time, have built new infrastructure without taking older equipment offline or updating them. This results in not only additional power expenses, but also clear and present dangers to the network as more likely than not these appliances will be weak points in your defenses. To prevent that (and to reduce power costs), built a network map showcasing what connects what and what servers, routers, and other network appliances do what. If no one knows what it does, audit the machine. The machine could be completely abandoned or might have applications that can be virtualized, reducing power costs and consolidating hardware. It's also a good idea to implement colocation services for your hardware, so that mission-critical applications are powered and connected in facilities designed to stay up and running no matter what.

Now that you know what everything in your network is and what it does you can apply the appropriate security measures. This is best managed by utilizing the whitelisting features found in most firewalls. The reason why whitelists work better than blacklists is because new applications (and malware) are created every day, so managing a blacklist is much harder than managing a whitelist. Employees may express concerns that they canât use certain applications, which will be a lot of work once the whitelist is launched, but this helps to curb shadow IT and many other potential sources of breaches so the headache is worth the effort.

Speaking of end users it is important to protect them at the desktop level with some type of anti-virus (AV) solution as well. Using an AV solution alone is asking for trouble since anti-virus wonât do much against attacks to break into the network, but used in combination with a firewall it will help to defend against that many more types of attacks. In combination with application control and intrusion prevention services (designed to stop attacks on said network) that most business grade firewalls have, you will have the basis for a secured network at both the end point and the network edge.

Of course, keeping that network secured requires maintenance. Running network penetration tests on a regular basis are good because they help you to find problems before the bad guys do, and updating applications goes without saying. This is a common weak point as it is difficult to stay on top of every server to make sure it is updated, but most attacks tend to come in from application exploits, such as Heartbleed and Shellshock did when they were found earlier this year. By being diligent about keeping applications updated, you are able to preemptively solve most of these problems without having to hear on the news about the newest big, bad exploit. Also be sure to make extra sure that you are protected against said big, bad exploit â it never hurts to be sure!

Finally, make sure that your end users know what they can and cannot do with their work equipment and BYOD devices. Having policies against tools such as DropBox and flash drives can help to stymy attacks from the inside, as well as protecting against infected applications that the user might have at home, and wherever applicable be sure to share the company-approved version with your end users so that they can stay compliant with your policies. Users might express some concerns, and at this point management can determine with IT whether the employee benefits of certain applications outweigh potential security risks â this will vary from company to company so the conversation needs to be had for each specific case.

Post a Comment

Please notify me the replies via email.

Important:
  • We hope the conversations that take place on MyTechLogy.com will be constructive and thought-provoking.
  • To ensure the quality of the discussion, our moderators may review/edit the comments for clarity and relevance.
  • Comments that are promotional, mean-spirited, or off-topic may be deleted per the moderators' judgment.
You may also be interested in
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top