Part 1 – The Basics
Part 2 – How do you Manage?
Part 3 – Tracking Changes, Patching, and Endpoint Security
Part 4 – Identifying and Classifying Data, Encryption Strategy, Backup and Disaster Recovery
Part 5 – Securing Groups, Assigning Permissions, and Web Monitoring
Over the past few weeks, we’ve shown you how to think of your network as a house with a fence. We’ve focused on protecting the exterior of the network. Last week we started to explore some of the ways you can protect your network internally and we’ll continue that discussion in today’s post.
Next Generation Firewall – A Next Generation Firewall (NGFW) offers an advanced layer of protection from malware and cyberattacks. NGFWs have intelligence that constantly analyzes the data passing through your network. When something unrecognized is detected, it is blocked and sent to an automated lab for immediate examination. The NGFW is connected to a global network that constantly gathers and shares information between members about new and emerging threats to help each member provide more protection. A NGFW brings intelligence not seen in a standard firewall to your network.
Security Info & Event Monitoring (SIEM) – SIEM gives your business a complete view of your security stance by collecting and organizing data from multiple sources. This software detects suspicious activity, unauthorized access from users, and abnormal patterns. It can also predict a potential attack. Many compliance regulations require log management as an essential step to securing your data. It is difficult to monitor the events that take place in your network and infrastructure without collecting the log data. Carolinas IT works with Cygilant to offer SIEM to automate the process of collecting and correlating your data.
Email Filtering – According to the Kaspersky Lab, over 58% of email was spam in 2016. That’s more than half of your email! Why not filter out the junk while simultaneously protecting your network from malicious email content? Email filtering services such as AppRiver allow you to implement parameters around email. You can decide what does and does not get through. Users can request to add senders and domains to safe lists for approval from network administrators.
Ensure that all your applications and hardware have threat detection capabilities enabled to ensure you are not missing any threats that enter your network. Protecting the inside of your network is just as important than protecting the outside of your network. Contact us today for help with building your layered defense.