A How To Of Network Security For Newbies

For those already IT professionals specializing in security, this how to of network security is probably not going to be informative. However, for someone new to the world of IT management or for someone working on their own website or consulting with an IT professional this will provide you with the basics.

To offer the how to of network security seems to get left behind and security and IT professionals simply tell the company what is needed. While this may be the best option in a large company, for small company were budget considerations may come into play having a discussion about the best and most cost-effective ways to provide security for the network, websites, servers and devices will always be important.

Always Know Devices

While this may seem obvious, knowing what devices are accessing your system will be a critical factor. This becomes more important as employees or managers may use their own personal devices at work or may even work remotely from their home computer, accessing data and working through your VPN (Virtual Private Network) or through a proxy server set up on your network.

Knowing the devices has another important aspect in a how to of network security tips. It allows you to identify devices with known vulnerabilities and either block that device or ensure it is upgraded to the latest operating system and security patch.

The good news is that there is scanning software, some available at no cost, to complete these types of risk or vulnerability tests on your system as well as the devices that connect.

Update Your System

There is no point in upgrading and updating devices and not installing the latest in patches and hotfixes for the system. This includes both the operating systems in use as well as all applications using the system.

Automatic update settings are a good idea plus you should check regularly for additional hotfixes or service packs and download and install them immediately. If the developers are aware of the vulnerabilities, it is only because there has been a breach or a hack and you do not want to be next.

Email Encryption and Monitoring

First, it is a very good idea to block specific types of attachments to emails. This is an essential how to of network security as if malware and other types of viruses can't be opened there isn't as much of a risk.

Typically, it will be important to block incoming files through the email system that include .exe, .bat or .vbs attachments. Additionally, using PKI digital certificates or Personal Authentication Certificates for each employee is a good idea. This fully encrypts email sent and allows the employees to accept encrypted email from trusted senders.

With the use of digital signatures and encryption available through the use of Public Key Infrastructure, which is the same framework used with SSL certificates and SSL encryption, it is impossible for malware to be added or attached to emails during transmission between the sender and receiver.

Know Who Needs Access

One of the least implemented how to of network security is the use of limited access to sensitive data and systems. In smaller businesses, there is often more of an open system where all employees have access or use one password and login to access specific files or data.

This creates a very high risk of a security breach. A disgruntled employee or someone fired from the company can capitalize on these slack security measures and breach or access the system very easily even from a remote computer if they have even limited knowledge.

By setting up limited access, with only the minimum possible access for each user you have better control over the system, more accurate log information and details about attempts by specific employees to access different files, tools, utilities or data.

With this type of system, it will also be critical to have a way to revoke email certificates and password and login combination if the employee is terminated or if there is a suspected breach. With this ability, it is possible to potentially limit the breach and avoid more significant issues.

While there are a lot of how to of network security blogs and articles, the best option is always to work with products and IT security providers with experience and expertise in this very important area.

To find out how Comodo products can help with your network security needs, see our team online at https://www.instantssl.com or give us a call by phone at +1 888 266 6361.

Related Articles
Content

Close icon

Comodo Advisor CHAT WITH
AN ONLINE ADVISOR

Chat With Instantssl Sales Team

Chat with Support

Click here to visit the online Comodo Support Portal.

Your support question may have already been answered.