Five Ways to Rise above the Security Poverty Line

Five Ways to Rise above the Security Poverty Line

Does raising a business above the Security Poverty Line sound like a troublesome task? It doesn’t have to be! In our newest tipsheet we will show you five ways you can help raise any business above the Security Poverty Line. Just click the image above for a web friendly version of the tipsheet. If you do not want a visual representation, we’ve provided a text version below.

Method 1: Auditing

Don’t do this...

Updating a network map isn’t auditing. An audit isn’t a mechanical process, it’s an involved process where you take measure of everything you possibly can that pertains to your IT security.

Instead, try this!

Auditing is an involved process. If it can be audited, it likely should be. Whether it’s user access, network usage, or even just the operating systems used across the network, the information obtained in an audit is valuable from a security standpoint.

Method 2: Access Management

Don’t do this...

If everyone on your network has administrator privileges to “make things easier,” you’re putting yourself at unnecessary risk.

Instead, try this!

You should be following the principle of least privilege. Only provide access to what your users need to do their jobs. If they don’t need access, then don’t provide it.

Method 3: Authentication

Don’t do this...

Well, Paul in security gives everyone a once-over on their way inside, that’s why we don’t bother with passwords. Paul knows they work for us.

Instead, try this!

Every user, at a minimum, needs their own unique username and password to access systems. This not only keeps intruders out, but also allows for user activity to be tracked in the event that they are in fact the threat.

Method 4: Endpoint Security

Don’t do this...

“When we set up a new system we install whatever the current top-of-the-line security suite is… and then do nothing to maintain or keep it up-to-date.”

Instead, try this!

Endpoint security across a network should be as uniform and up-to-date as possible. This makes monitoring and managing the system a much easier process.

Method 5: Network Segmentation

Don’t do this...

Network segmentation? Of course our network is segmented. It goes internet, firewall, network. That means it’s segmented from the internet.

Instead, try this!

If your sales staff have access to your development team’s personal storage, then something has gone terribly wrong. Your network should be set up in a way so that if Bob in sales unintentionally installs crypto-locker, at worst, it will only be the one department’s network that goes down. Minimize collateral damage, segment your networks.

Ready to Get Started?

Try AuthAnvil