部落格

5 Critical Steps to Safeguard Against Weak Links In Your Security Policy

Posted on December 13, 2018 by Gento

The rise in cyber-attacks and ransomware threats have many businesses increasing their IT infrastructure security. Unfortunately, in an effort to increase security, far too many businesses overlook the proper configuration of IT devices and systems, as well as the importance of creating an enforceable security policy. The best data security policy in the world means nothing if networks and devices aren't properly configured, and if employees ignore the best practices that are in place to prevent cyber-attacks. 

Reduce Risks with A Strong Security Policy 

The 2017 Data Breach Investigations Report (DBIR), 10th Edition, Annual Survey of Incidents and Breaches Trends revealed that 51 percent of attacks use malware, 81 percent of hacking-related breaches are attributed to either stolen or insufficient passwords, and 62 percent of all data breaches were the result of hacking efforts. With these sobering statistics in mind, there are five critical steps that you can take to avoid the most common security policy weak links that lead to data breaches and thefts. 

1.    Create Strong Passwords. -- In 2016 an impressive 63 percent of data breaches were completed courtesy of weak or stolen passwords. Instead of learning from the mistakes of others, far too many businesses failed to address their password security weaknesses. This state of inaction led to 81 percent of hacking related breaches using stolen or weak passwords in 2017. Instead of relying on default passwords, using the same password for all accounts, or digitally storing your passwords in an email, note or text message, businesses need to ensure that employees are creating strong passwords. Additionally, their passwords should be updated on a regular basis, include a special character, feature both upper and lower-case letters, at least one number, and be within 8 to 16 characters.

2.    Add Endpoint Protection, Including KVM Switches. -- Endpoint security is paramount to keeping your vital business data safe from hacking attempts. To ensure that your endpoints are secure you need to not only use an updated anti-virus software protection, but you also should leverage the security-boosting power of KVM switches. These switches are built to dismantle cyber-attacks at their onset. The KVM switches block signals, increase data control, remove desktop clutter, and remove risky data sharing to effectively limit the destructive power of a cyber-attack.

3.    Segment the Network. -- In today's digitally driven world where administrative privileges were exploited in more than 50 percent of inside data thefts, businesses need to begin to segment their networks. Network segmentation not only protects against inside job data thefts, but it also limits the actions of hackers, should they gain access to your network. As part of your efforts, you should also track employee actions, monitor administrative privileged functions, and flag anomalous behavior for immediate review and action. 

4.    Limit Network Access. -- Segmenting your network is only effective if you also limit network access. If your employees are signing into your network from an insecure WIFI connection, you are immediately opening the door for a hacker to walk through and begin laying the foundation for a ransomware or cyber-attack. As part of your security policy, you should require SSH, VPN, and data encryption to protect against hackers who are trying to infiltrate your network. You should also limit network access to trusted hosts and customize Internet-connected device configurations before they are connected to your network.

5.    Simplify and Future Proof. -- Far too often, businesses create more risks when they rush to resolve security weaknesses. To avoid this issue, businesses should focus on simplifying and future proofing their security policies. Through the use of Raritan's intelligent PDUs, businesses can leverage a customized engineering model that is designed to meet specific requirements. Through the Xerus Technology Platform, businesses can enjoy the benefits of interoperable architecture and firmware, while simultaneously gaining the flexibility and reliability needed to shore-up IT security defenses.

Data Protection Starts with A Strong And Enforceable Security Policy

The moral of the story is simple, if you want to protect your business against cyber-attacks, then you need to create a security policy that is strong and enforceable. It is a moot point to spend money shoring-up IT security defenses, if you can't ensure that your employees and clients are following the steps laid out within your security policy.

Fortunately, with the help of trusted KVM switches, Intelligent PDUs, and the right technology platforms, Raritan can help your business safeguard against security vulnerabilities.

Visit our website to learn more. 
 

Other Blog Posts

從資料中心失效對企業帶來的骨牌效應──探討感測器的重要性
Posted on November 5, 2023
更高規格的電源要求加速AI市場成長與Raritan PDU的採用
Posted on October 11, 2023
資料中心服務中斷次數減少,但停機的代價仍舊可觀
Posted on September 20, 2023
意見調查:資料中心面臨能源使用與人力短缺困境
Posted on September 20, 2023
Raritan安全切換器:相容於Secure NIAP 4.0的桌上型KVM
Posted on September 20, 2023

View all Blog Posts

訂閱

近期活動

New Zealand Cloud & Datacenter Convention 2022
3 November 2022, 9am – 4pm  •  Grand Millennium Hotel, Auckland, New Zealand
Data Centre World Singapore
12th – 13th Oct 2022
Korea Cloud & Datacenter Convention 2022
6th Oct 2022
Philippines Cloud & Datacenter Convention 2022
4th Aug 2022
JANOG50 Meeting Hokkaido
3th – 15th July 2022

View all Events

Raritan最新新聞

Legrand 使用兩大創新智慧型機架 PDU 重新活化資料中心產業
Posted on May 1, 2023
Exclusive interview丨How does Huizhou upgrade its manufacturing industry?
Posted on December 2, 2021
Raritan 發表 MasterConsole® 數位雙電腦切換器
Posted on February 18, 2021
Legrand Data, Power and Control Division Announced as Finalist in Six Categories at DCS Awards 2020
Posted on November 9, 2020
Raritan 新款智慧機櫃控制器 (SRC) 可智慧管理資料中心與關鍵任務設施的環境與安全性資訊
Posted on November 9, 2020

View all news