5 Network Security Best Practices You Need To Implement in 2017

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Let's take a look at these five lessons that are most critical for the IT staff to know:

1. Use the log files that your applications and network devices already create to identify potential
issues.

2. Phishing, a form of social engineering, is an extremely popular attack vector. Teach your users
to recognize a phishing attack and not to click on email attachments unless you can verify the
attachment is legitimate. If the user is not sure about an attachment, follow the corporate policy
to authenticate the attachment.

3. Tell your users that if they get a phone call from someone who identifies himself as a fellow
employee asking questions that seem inappropriate or unusual, that they should confirm the
caller's identity and authorization before divulging any information.

4. Require every person going through a security door to present his or her ID. Do not hold doors
open for strangers or allow others to tailgate on your security ID card.

5. Teach your users to never put a thumb drive or other storage device into a corporate computer if
the user does not know where the drive originated. A popular ploy of attackers is to give away
infected thumb drives or "drop" them in parking lots of target companies. If in doubt about the
safety of a thumb drive or other storage device, employees should ask the IT staff to scan it first
for potential malware before inserting it into any computer.

5 Network Security Best Practices You Need to Implement in 2017

1. Meticulously Maintain Software

2. Monitor Your Permissions

3. Establish a Security Policy

4. Monitor Third-Parties

5. Deploy a Total FIM ( file integrity monitoring )Solution.

You might also like