Internal And External Threats Of Network Security

885 Words4 Pages
Relentless cyber criminals, disgruntled current and former employees and careless users can bring down your computer networks and compromise data. Network security 's made up of the hardware, software, policies and procedures designed to defend against both internal and external threats to your company 's computer systems. Multiple layers of hardware and software can prevent threats from damaging computer networks, and stop them from spreading if they slip past your defenses. The most common threats to your systems: Malicious programs like viruses, worms, Trojan horses, spyware, malware, adware and botnets Zero-day and zero-hour attacks Hacker attacks Denial of Service (DoS) and Distributed Denial of Service Attacks (DDoS) Data theft These threats look to exploit: Unsecured wireless networks Unpatched software and hardware Unsecured websites Potentially unwanted applications (PUAs) Weak passwords Lost devices Unwitting users or users with malicious intent Top 5 fundamentals of network security These network security fundamentals are vital to downtime prevention, government regulation compliance, reduced liability and reputation protection: 1. Keep patches and updates current Cyber criminals exploit vulnerabilities in operating systems, software applications, web browsers and browser plug-ins when administrators are lax about applying patches and updates. In particular, verify that office computers are running current versions of these much used programs: Adobe Acrobat and Reader Adobe Flash Oracle Java Microsoft Internet Explorer Microsoft Office Suite Keep an inventory to make sure each device is updated regularly, including mobile devices and network ... ... middle of paper ... ...t their employees had access to "sensitive, confidential data outside the scope of their job requirements." In reporting on the study 's findings, said "general business data such as documents, spreadsheets, emails and other sources of unstructured data were most at risk for snooping, followed by customer data." When an employee 's job changes, make sure the IT department is notified so their access privileges can be modified to fit the duties of the new position. 5. Clean up inactive accounts Hackers use inactive accounts once assigned to contractors and former employees to gain access and disguise their activity. The HP/Ponemon Institute report did find that the companies in the survey were doing a good job deleting accounts once an employee quit or was laid off. Software is available for cleaning up inactive accounts on large networks with many users.
Open Document