EFFECTIVE CYBER SECURITY STARTS WITH A SECURE NETWORK.
Help make your network secure by developing and implementing some simple policies and response
Control who can access your network – and what they can do in it.
Do you know who is accessing your network?
SECURE WIRELESS ACCESS
Secure your wireless access points, only allowing known devices to connect to your Wi-Fi services.
Have you installed security scanning tools to detect and locate unauthorized or cloned (“spoof”) wireless access points?
PREVENT MALICIOUS CONTENT
Use malware – checking and scanning services to evaluate where files come from. They will also check incoming and outgoing data from external sources (the “perimeter”). such as mobile devices, as well as your own internal protection.
Do you use malware and antivirus protection at your perimeter, as well as on the devices in your offices?
MONITOR YOUR NETWORKS
Use network detection and prevention tools and make sure they are correctly installed by someone qualified.
Is your network configured to deny traffic as a default?
SEGREGATE YOUR NETWORKS
Identify group together and then isolate systems that are critical to your business – and apply the appropriate network security controls to them.
Are your essential services as protected as possible, even if other parts of the network become compromised?
RAN REGULAR SCANS TO CHECK VULNERABILITY
Regularly run automatic scanning tools on your networked devices. Use the findings to resolve or manage any vulnerability identified.
Do you perform vulnerability assessments to check your systems and networks?
IS YOUR NETWORK CONFIGURED TO DENY TRAFFIC AS A DEFAULT? USE FIREWALLS
Use firewalls to create a buffer zone between the internet – and any other networks you don’t trust – and your business’s internal networks.