Network Security – 7 layers
- Endpoint Security: Protecting all endpoints, including workstations, laptops, tablets and smartphones, is an essential component of any comprehensive security strategy. Endpoint management includes threat detection and blocking of malware, adware botnets, spam and phishing attempts.
- Vulnerability Management: Keeping client environments safe requires ongoing vulnerability management to identify, report and address issues that pose security risks. Network vulnerabilities typically involve configuration errors and unauthorized changes.
- Patch Management: One of the most common methods of delivering malware is by exploiting vulnerabilities. Left unpatched, these vulnerabilities leave the door open for infections. Automating the patching process is the best approach, because if users are asked to apply patches, they will often fail to do so.
- Content Filtering: With content filtering in place, administrators can build website blacklists and set rules to screen email and web-based content to prevent unwanted types of data and files from entering clients’ networks. Content filters can also serve the dual purpose of keeping users away from objectionable web content and blocking malicious code.
- Email Security: Hackers love email because it has proven to be one of the most successful attack vectors. So-called “phishing” techniques prey on users’ curiosity, fear and trust to trick them into clicking infected attachments and URLs.
- Backup and Recovery: One of the most basic security practices is to back up all critical data and prioritize it for recovery, should a company ever experience a data loss as a result of a cyberattack or some other reason. This is an essential service accomplished by implementing automated backup for servers, workstations, files and email, so that if ever needed, the data is recoverable.
- Network monitoring: Software that continuously runs and collects data about each and every visible network device is a necessity in order to maintain proper asset management. Having historical data is also very useful for troubleshooting network systems.