COVID-19: Critical business support and our focus on employee health. Learn More

The Raritan Blog

Weak Links in Security Part 2: How to Create a Secure Network Configuration

Posted on April 4, 2018 by Richard Dominach

The 2017 Data Breach Investigations Report (DBIR) revealed that 51 percent of breaches involved the use of malware. Of these breaches, 66 percent were initiated via phishing campaigns that used malware infected email attachments. As discussed in Part 1: Configuration Is the Biggest Security Threat, there are five steps that businesses need to take to mitigate configuration security risks. These steps include: endpoint protection, strong passwords, a restricted number of login attempts, alternative authentication, and limited access to critical systems. Upon completing these steps the next task will be to ensure that all devices, communications, logging, and vulnerability responses are properly configured to create a secure network for your vital business data.


Subscribe


Upcoming Events

2020 DoDII Worldwide
August 2–5  •  Phoenix, AZ
AFCOM Data Center World 2020
August 24–27  •  San Antonio, TX
DCD NY 2020
September 1–2  •  New York City, NY
Critical Facilities Connect 2020
September 14–15  •  Charlotte, NC
Spiceworld 2020
September 15–20

View all Events

Latest Raritan News

Raritan Introduces Economical New Generation KVM-Over-IP Switch and Serial Access for SMBs
Posted on March 2, 2020
Extended IT rack power mapping possibilities with Raritan’s locking solution
Posted on October 23, 2019
Raritan Ranked as the Global Leader in KVM-over-IP Switches
Posted on October 21, 2019
Raritan’s New KVM-over-IP User Station Brings 4K Performance and Productivity to Remote Equipment Access
Posted on September 18, 2019
Raritan’s New 4K Ultra HD KVM-over-IP Switch Wins Best of Show Award at NAB
Posted on May 21, 2019

View all news