security

Even Plug-and-Play Switches and Routers Must Be Properly … – BizTech Magazine


Firewalls Help but Don’t Address Internal Vulnerabilities

A well-configured internet firewall will prevent many attacks, but attacks from within your business’s network can easily exploit vulnerable network devices.

Common vulnerabilities and exposures include denial of service, which prevents the device from functioning properly; privilege escalation, which occurs when an attacker gains improper access to the network device; and remote code execution, which a criminal can use to turn your network device into a platform for launching attacks.

Regularly Assess Your Network to Determine Risk

A simple way to discover active vulnerabilities is to scan your network with a vulnerability assessment tool. Armed with this information, you can assess risk and begin patching. Your technology partner will recommend software versions that have resolved some of the vulnerabilities you find.

Even better than a simple vulnerability scan is to bring in a security partner who can assess the network, rank vulnerability severity and recommend a mitigation strategy.

EXPLORE: How to choose the right router for your business.

Prioritize Patching Network Devices with the Most Risk

New vulnerabilities are discovered constantly, and even dedicated security professionals can have trouble keeping up.

However, not all vulnerabilities represent the same level of risk. Some are critical, while others are ranked high, medium or low. Critical vulnerabilities represent serious risk and should be patched immediately.

Additional Configuration Steps Can Help Tech Survive Attacks

No amount of scanning and patching can replace proper configuration. However, the IT team should ensure your business is using authentication, authorization and accounting schemes to limit and log what administrators do. Vendor security hardening guides can help make a device resistant to attacks.

Monitoring network devices and collecting their logs can detect unusual behavior that might indicate an attack. Periodic auditing of a device’s configuration and operating state can help ensure it is functioning in compliance with policy.



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.