部落格

Weak Links in Security Part 2: How to Create a Secure Network Configuration

Posted on April 25, 2018 by Gento

The 2017 Data Breach Investigations Report (DBIR) revealed that 51 percent of breaches involved the use of malware. Of these breaches, 66 percent were initiated via phishing campaigns that used malware infected email attachments. As discussed in Part 1: Configuration Is the Biggest Security Threat, there are five steps that businesses need to take to mitigate configuration security risks. These steps include: endpoint protection, strong passwords, a restricted number of login attempts, alternative authentication, and limited access to critical systems. Upon completing these steps the next task will be to ensure that all devices, communications, logging, and vulnerability responses are properly configured to create a secure network for your vital business data.

Secure Device Configuration
If a device is not properly configured, then all of the security protocols in the world won't stop a data breach from occurring. If a data breach does occur on an improperly configured device, then the hacker will be able to wreak havoc. Secure device configuration is made easier when you follow these protocols.

  • Lockdown any services that you are not using. Remote management systems that are not in use should also be thoroughly secured. Keep in mind that we are less likely to pay attention to the services that we aren't using, which inevitably makes them the perfect weak point for hackers.
  • Disable or change the default settings on ports.
  • Limit the use of old and outdated web technologies. For example, individuals and businesses using old Flash versions are often subject to ransomware attacks. Java, NPAI, and Plugins also need to be kept up to date to avoid any security vulnerabilities.

It is important to note that secure device configuration only works if all of your devices have the proper settings. In other words, don't forget to close the barn doors tightly. All a hacker may need is one improperly configured device on your network.

Restrict and Secure Network Communication
Your network must be protected at all costs. After all, if a hacker gains access to your network then they can implement further malware or ransomware attacks. Defending the network is especially important given the fact that phishing is so successful. To mitigate the risks associated with a phishing attack, you should block C2 communications, segment the network, and always use two-factor authentication. As we discussed in Part 1, while secure passwords are important, there are other steps such as restricting network access to vital systems and data that must be taken.

Network access must be restricted to trusted hosts and other networks. In fact, you should only allow Internet access to required network services when it is absolutely necessary. If you deploy systems that can be directly accessed to the Internet, then you are not only creating visible security vulnerabilities, you may be creating backdoors and hidden alleys that hackers can use to infiltrate your network. With this in mind, there are businesses whose employees rely on remote access. If this is the case, then you should use VPN, SSH, or another secure access method to help reduce the security risks associated with remote network access. Additionally, the right type of encryption should be used to reduce the impact of a breach. SSLv3 is no longer considered a secure encryption method; TLS sessions should be used in its place.

Don't Let Attacks Go Unnoticed Indefinitely
The final step in creating a secure configuration involves logging, detecting incidents, and reporting breaches. Did you know that attackers can hide their location, activities, and malicious software for years? In fact, if you don't take the right steps, then attacks may go unnoticed for an indefinite period of time. Logging records can sometimes provide the only evidence of a successful attack. Logging also generates the following benefits:

  • The ability to detect inside and outside hacking jobs.
  • Web logs and a centralized store of logs can help to spot attacking trends and be useful in creating a stronger network.
  • Logs can be helpful in detecting the origin of phishing attacks.

In addition to logging, businesses should use real-time monitoring to gain immediate insights into security alerts that have been generated by applications and network hardware. In many cases, the faster a business can respond to a data incident, the greater the likelihood that they can mitigate the damages and protect their vital business data. As part of this effort, vulnerability management must be taken seriously. Research shows that new vulnerabilities are discovered every day and half of all exploitations of these weaknesses occur within 10 - 100 days of their discovery.

The Bottom Line: Protect Your Business with a Secure Configuration
Only through the proper configuration management steps can you protect your business and its data. No longer is it enough to simply rely on default network and device configurations. Through new vulnerabilities and increasingly savvy malware attacks, the default settings do not provide ample security. Instead, by taking the steps to properly configure your devices and network, you can create a more secure system. To learn more about Raritan’s product and how they are built to safeguard against security vulnerabilities visit, here.

Other Blog Posts

從資料中心失效對企業帶來的骨牌效應──探討感測器的重要性
Posted on November 5, 2023
更高規格的電源要求加速AI市場成長與Raritan PDU的採用
Posted on October 11, 2023
資料中心服務中斷次數減少,但停機的代價仍舊可觀
Posted on September 20, 2023
意見調查:資料中心面臨能源使用與人力短缺困境
Posted on September 20, 2023
Raritan安全切換器:相容於Secure NIAP 4.0的桌上型KVM
Posted on September 20, 2023

View all Blog Posts

訂閱

近期活動

New Zealand Cloud & Datacenter Convention 2022
3 November 2022, 9am – 4pm  •  Grand Millennium Hotel, Auckland, New Zealand
Data Centre World Singapore
12th – 13th Oct 2022
Korea Cloud & Datacenter Convention 2022
6th Oct 2022
Philippines Cloud & Datacenter Convention 2022
4th Aug 2022
JANOG50 Meeting Hokkaido
3th – 15th July 2022

View all Events

Raritan最新新聞

Legrand 使用兩大創新智慧型機架 PDU 重新活化資料中心產業
Posted on May 1, 2023
Exclusive interview丨How does Huizhou upgrade its manufacturing industry?
Posted on December 2, 2021
Raritan 發表 MasterConsole® 數位雙電腦切換器
Posted on February 18, 2021
Legrand Data, Power and Control Division Announced as Finalist in Six Categories at DCS Awards 2020
Posted on November 9, 2020
Raritan 新款智慧機櫃控制器 (SRC) 可智慧管理資料中心與關鍵任務設施的環境與安全性資訊
Posted on November 9, 2020

View all news