Network Security

Areas of Concentration

Router

This is typically the first piece of equipment that connects directly to the Internet. Routers have a host of services and protocols that must be locked. All the more critical is this device if it also provides wireless services. Like a computer it has an operating systems that can be vulnerable to flaws and vulnerabilities. Specialized security training is required to harden this device. 

Internet of Things (IoT)

Internet of Thing (IoT) are those devices which make our lives so much easier to manage. Think Alexa or Google assistants, home and business or automation plus surveillance. We face unique challenges with these devices. They have non-standard operating systems, lack security and create back doors into networks. Great care should be given to IoT devices used within your business.

Firewall

Security appliances that are performing firewall duties are one of the most important devices within the business network. This device should be setup to allow in and out only that which is necessary for the given business. We commonly find significant configuration issues with these devices that would permit hackers in and data to be exfiltrated out. Expert device know-how should be sought to validate the configuration.

Switch

Like any other piece of network equipment, we recommend that these devices locked away in a room with good air flow. Network switches permit multiple computers to connect to a single device. They can then talk to each other, other company assets and websites on the Web. These devices require the same hardening and configuration expertise to ensure that they do not expose your business to undue risk.

Denial of Services

If your clients and customers are unable to get to your website or interact with it normally you may be experiencing a Denial of Services (DoS) or a Distributed Denial of Services (DDoS) attack. You’ll want to know how this works and what you can do to prevent it before it happens.

Email Security

An incredibly high percentage of successful cyber attacks result from Phishing, Spear-Phishing and Whaling email message. These messages contain some sort of malicious payload that infects the computer. A careful evaluation of your email system should be performed to expose what should be corrected.

Scroll to Top