With the release of each new cybersecurity study, staggering statistics stare us in the face. The danger and risk posed by malware and cyber-attacks grow every day. We’ve made it our job to protect our clients, but we also like helping anyone we can. Last week, we brought you 7 Tips To Protect Your Work Computer. This week, we’re following that up with tips for cybersecurity across your entire network.
1. Inventory All Hardware – Authorized & Unauthorized
Computers come to mind when thinking about securing hardware. However, the definition of hardware includes much more than that. From phones to smart TVs, every device on your network provides a potential point of attack. Remote hardware complicates matters even more, but those devices need protection also. Inventory anything accessing your network.
2. Inventory All Software – Authorized & Unauthorized
You should know what software is installed on each device at all times. This can help you identify and remove prohibited or unwanted software. Limiting installation of approved software only reduces the risk of unknown software exploits.
3. Secure Configuration
Next, you should take it a step beyond just knowing what software and hardware you have. Take the time to configure all software and hardware to your specifications. Once that’s done, remove the ability for typical users to modify those configurations. If a user can change something, they likely will.
4. Monitor All Network Ports
There are multiple attacks, such as WannaCry and Petya, that exploit network ports to spread over your entire network. Use the proper network hardware to monitor and control ports. The right hardware goes beyond control and lets you monitor the traffic moving through them.
5. Continuously Update All Devices
Every major threat makes use of a vulnerability in either hardware or software. Security patches and updates eliminate those vulnerabilities. Patching is a never-ending cycle that must be maintained. Are ALL your devices up-to-date and secured? That includes your network hardware, printers, mobile devices, and even security cameras.
6. Monitor & Control All User Accounts
When we bring in a new client, we often find active user accounts for people who are no longer with the company. Disable old accounts when they’re no longer needed. Also, make sure users aren’t sharing passwords.
7. Verify Access Control & Administrator Access
Beyond just monitoring, ensure that users only have access to the data they need. Additionally, no user should have a daily account with administrator privileges. If administrator privileges are needed, a secondary account should be created just for those occasions.