Protect users to get secure networks
As an IT administrator, security advisor, computer expert, there are more problems on your list of network environments than security issues. There are millions of dollars, thousands of hours of work and even an attempt
Derek Melber
How to prevent your employees from accidentally becoming a threat to the team.
As an IT administrator, security advisor, computer expert, there are more problems on your list of network environments than security issues. There are millions of dollars, thousands of hours of work, and a time-consuming attempt to configure the machine to fight security issues spreading like a plague for networks. Unfortunately, there is no real solution to protect your network completely. Recent studies have demonstrated that although security is a major issue for IT staff, other users still have some actions to unsafe things. There are many solutions to most of these issues that I want to cover in this article.
Security overview from users
There is a study done by RSA in late 2007 with Statistics made by technology experts in both Boston and Washington. Users are employees in companies surveyed with questions related to security and user privacy practices at the office. Both Boston and Washington are big cities with many corporations and employees working for government organizations. This study focuses solely on how users use and access corporate data and how they access physical methods with computer and company resources. The results of the study are given in Table 1 below.
Subject asked Percentage of business employees Percent of government employees Access email through a public wireless hot spot6437Look laptop, smart phone or USB flash88Send documents to a personal email address to be able to Access from home6168 Wireless corporate network is used for conference rooms and guest rooms are always open without logging190Keep a secure door open for someone to work they do not recognize3235Forget lock or access card and be taken entering the building by someone you did not know about them4234 Detecting an unfamiliar person working in an empty room within their building.2141Already identified or reported a stranger2863 Moved internal work and still have access to accounts or risks Not necessary3334Down to a corporate network that they should not have access2029
Table 1: Results on asking employees about their office security
As you can see from the results in Table 1, the amount of money, time and effort required to train employees on technology security as well as resources is not sufficient to pay for all issues. that topic. However, with written policies, logical and physical policies, many of these problems can be admittedly non-existent even if the user decides to ignore appropriate security procedures.
Physical security
Every IT expert understands that if the company's physical security is compromised, the resources that are being protected can be destroyed much faster. Based on the questions asked in the study, here are some solutions that can help overcome problems related to physical security.
Holding the safety door open for someone to work but not recognize them?
Forgot the lock or access card and was put into a building by someone you didn't know about them?
- Provide ID cards for employees.
- Create a policy that requires employees to wear or show ID cards at all times.
- Install the ID card reader at all building entrances as well as the rights inside the building.
- Take a security guard at the main entrance to the building to check the ID card.
- Install the camera on all external doors and main points inside the building.
Discovering an unfamiliar person working at an empty room within their building?
Have asked for identification or reported strangers?
- Like employees, all visitors to the company need to wear a guest card when entering a company building.
- With both employees and guests wearing ID cards, you will easily discover the uninvited person.
- Employees should be encouraged to report strangers and must wear tags.
- Signs, reminders, memoranda, . need to be posted regularly to remind people to wear ID cards.
Logical security
Even with the spill of spam, adware, viruses, Trojans, . related by email, employees still don't care about the negative aspects of email abuse. Implementing a more stringent security environment on email and other network access can help prevent users from following good security practices themselves.
Access email through a public wireless hot spot?
- Do not provide access to email outside the company unless using a VPN or a secure connection.
- Configure mail server capable of checking and executing authentication mechanism from the intranet.
- Do not allow users to connect to remote desktop unless they create a connection to the VPN first.
Send documents to a personal email address to be accessible from home?
- Enable encryption with all outgoing emails
- Configure filters for attachments for all outgoing emails. This can limit certain types of files as well as content attached to them.
- Restrict corporate firewalls from receiving POP3, IMAP and other methods of receiving email from outside the company's personal email sites.
- Add a policy to prevent users from accessing personal email while working
- Training and testing on how external email sites are configured can be dangerous to the company.
Does the wireless network within the company be used for conference rooms and open rooms without logging in?
- Configure wireless access points to perform a configuration:
- Do not promote SSID
- Enable MAC address filtering
- High security configuration like WPA and WPA2
- Execute a RADIUS server for authentication, shown in Figure 1 as an example of an access point option. - Use a Smart Card for all wireless network access
Figure 1: Wireless security can use previously shared keys and RADIUS servers to authenticate
Have internal jobs been transferred and still have access to unnecessary accounts or resources?
- Enforce rental procedures and work changes that require resource owners to provide full access to employees
- Execute Restricted Groups and Local Users and Groups inside Group Policy to control group membership, as shown in Figure 2.
- Enforce credentials for administrators inside Active Directory to restrict group membership administration.
- Perform normal audits of members of the security group.
Figure 2: Members of the internal group can be managed using PolicyMaker,
Windows Server 2008, or Windows Vista SP1
Falling into a corporate network that they shouldn't have access to?
- Implement a program that encourages encouragement to promote good security practices, such as network areas with faulty configurations.
- Make sure that NTFS permissions are configured on all network resources to group only the appropriate security groups.
- Execute group and user actions within Active Directory. Typically, user accounts are in groups, named and used to group similar user types residing in Active Directory. These groups are then placed in other groups, named and used to assign permissions that reside in Active Directory or Local Group residing on the resource server. Finally, the resources that need to be configured with the group are used to assign permissions.
- Execute Access Based Enumeration for all servers used to store data.
Conclude
Many parameters in the above parameters as well as solutions have been written in a policy-oriented way. Written policies must be accurate and clear to limit inappropriate behaviors. With the mandatory security through technical meaning, some solutions will require a change in how users access the network and data. While security is never easy, interesting or not too complicated, if security is not proposed early and often or not, most companies will be greatly affected and The results of these effects are shown in Figure 1, illustrating the absence of security policies.
You should read it
- SpaceX reportedly bans use of Zoom videoconferencing app by employees
- 7 most popular email security protocols today
- Just because the Reply All button, 11,543 Microsoft employees are the people in the email spam company
- Most Yahoo employees 'turn away' from Yahoo Mail
- What is email encryption? Why does it play an important role in email security?
- 8 best secure email services ensure your privacy
- The only secure email is the text-only email
- Learn about the ProtonMail email security application
- Tips for security for Email
- How to set up iCloud email and calendar access on Windows 10
- How to retain good employees?
- Additions for Exchange Server 2007 - Part 3: Email client access protection
Maybe you are interested
Good quizzes about New Year's Day for kids, with answers How to save notes as photos with Marked.cc Use Comments Tool in MS Excel Create Zombie photos during Halloween in Photoshop 5 effective study habits need to start today Choosing a photo that makes you feel the most annoying will reveal exactly who you are!