Tips for Wired Network Security – Part 1
November 16, 2016
Trends in Malware and Phishing Attacks
November 24, 2016

As discussed in Part 1, due to overall threats from insiders and outsiders, the security of wired networks should receive greater emphasis than wireless networks. The following are the last 4 of 8 simple precautions that a business should take for the protection of its system and data. It is advisable to consult with an IT support expert for effective implementation.

Physical Security

A network’s physical security is just as important as its Internet firewall, but it is often neglected. Absent strong physical security measures, either a hacker or an employee could easily compromise a network. For example, a cyber criminal could connect a wireless router into an open Ethernet port, allowing wireless access to a company’s network. Every organization should implement a security plan that prevents unauthorized building entry and network access.

Traffic Segregation via VLANs (Virtual Local Area Networks)

VLANs may be utilized to segregate a company’s network by type of traffic (VOIP, SAN, general access, and DMZ) for design or performance. Otherwise, segregation may be by user type (management, employees, and guests) for security. Dynamic assignment configuration makes a VLAN very useful. For example, a guest’s laptop may be automatically assigned to a specific VLAN, restricting its access within a network. This can be accomplished either through MAC address tagging or 802.1X authentication.

Up-to-Date Network

Confirm the installation of the latest firmware or software updates on every component of a network’s infrastructure. Check as well that the network’s computers and devices have the most current OS and driver updates. Ensure that all firewalls are active, antivirus programs are functioning and updated, and default passwords are reset .

Virtual Private Networks (VPNs) for Encryption

Encryption must be utilized to ensure network traffic security. Even if VLANs and 802.1X authentication were being used, cyber criminals may still be able to access a company’s network traffic, which may include documents, e-mails, and passwords, if unencrypted. Typically, VPNs permit only authenticated remote access by using tunneling protocols and encryption techniques to prevent the disclosure of private information,

Alpha Engineering Business Support

Choosing an expert computer technology-support provider is an important decision for your business. Alpha Engineering Associates has been a trusted partner of many companies in the Washington, Baltimore and Annapolis areas since 1990 and offer:

  • 24/7 Managed Services for Business Computing Systems
  • Network and Mobile Computing Support
  • Disaster Recovery Planning
  • Software Development

For affordable client-focused network consulting services and solutions, please call Alpha Engineering Associates today at 410-295-9500.

Comments are closed.