The Raritan Blog

Weak Links in Security Part 2: How to Create a Secure Network Configuration

Posted on April 4, 2018 by Richard Dominach

The 2017 Data Breach Investigations Report (DBIR) revealed that 51 percent of breaches involved the use of malware. Of these breaches, 66 percent were initiated via phishing campaigns that used malware infected email attachments. As discussed in Part 1: Configuration Is the Biggest Security Threat, there are five steps that businesses need to take to mitigate configuration security risks. These steps include: endpoint protection, strong passwords, a restricted number of login attempts, alternative authentication, and limited access to critical systems. Upon completing these steps the next task will be to ensure that all devices, communications, logging, and vulnerability responses are properly configured to create a secure network for your vital business data.


Subscribe


Upcoming Events

West 2019
February 13 - 15  •  San Diego, CA
Data Center World Global 2019
March 19 - 22  •  Phoenix, AZ
Data Center Dynamics NY
April 9 - 10  •  New York, NY
NAB 2019 - National Association of Broadcasters Show
April 6 - 11  •  Las Vegas
Interop 19
May 20 - 23  •  Las Vegas, NV

View all Events

Latest Raritan News

Raritan’s New KVM-over-IP User Station Brings 4K Performance and Productivity to Remote Equipment Access
Posted on September 18, 2019
Raritan’s New 4K Ultra HD KVM-over-IP Switch Wins Best of Show Award at NAB
Posted on May 21, 2019
Raritan Unveils KVM-over-IP Switch with Enhanced Performance and 4K Ultra HD
Posted on April 4, 2019
Raritan Announces New SmartSensors™ for Accurate Insights on Data Center Environmental Health
Posted on January 28, 2019
Raritan Extends Reach of Remote Server Management with New KVM Product
Posted on November 26, 2018

View all news