Cybersecurity Layers – Part 2

In the first article of this three-part series, we talked about taking a layered approach to developing and implementing a solid cybersecurity strategy. We talked about the two outer layers: people and perimeter.

In this article our focus will be on securing the network and the endpoints.

Network

A network is comprised of interconnected devices, such as computers, servers and wireless networks. Securing a network means taking the steps necessary to protect the integrity of the network and the data housed within it (more on data in our next article). There are multiple security policies, solutions and services required to adequately protect the network. Let’s look at a few of these solutions and services.

Network Segmentation

This refers to the separation of different parts of a computer network, or network zones with devices such as bridges, switches and routers. The key benefits of segmenting the network are:

  • Limiting access privileges to only those who require access to the specified resources
  • Protecting the network from widespread cyberattacks
  • Increasing network performance by reducing the number of users in specific zones

Wireless Authentication

Enables networks to be secure by ensuring that only users with proper credentials can access the network resources they require.

Security Information and Event Management (SIEM)

These are software products and services that combine security information management and security event management. They provide real-time analysis of security alerts generated by applications and network hardware.

Security Operations Centre (SOC) Services

These types of services continuously monitor and improve an organization’s security posture while detecting, analyzing, responding, and preventing cybersecurity incidents.

Endpoints

Endpoint security involves securing endpoints or entry points of user devices such as desktops, laptops, and mobile devices. Securing endpoints involves:

Endpoint Detection and Response (EDR)

These are integrated endpoint security solutions that combine real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities. These solutions are often referred to as next-generation antivirus although the resemblance to the antivirus software of old is very limited. Note that most cyber insurers will require EDR and will not underwrite a cyber insurance policy for an organization that does not have an EDR strategy in place.

Patch Management

This is a basic but critical process of distributing and applying updates to software. It is an often neglected task by organizations but it is a critical part of cybersecurity hygiene as the patches are often necessary to correct security vulnerabilities and bugs in applications. Patch management cadences is also one of the controls cyber insurers will look at.

Monitoring and Alerting Services

The purpose of these services is to look for unusual or suspicious activities at the endpoint level.

Drive Encryption

This type of technology protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

Vulnerability Scan

This is a service that enables organizations to monitor their networks, systems, and applications for security vulnerabilities.

Once again, the above listed items are part of developing and implementing solid cybersecurity strategies to mitigate and manage risks.

In the last part of this series, we will focus on the data and the resilience of an organization.

MicroAge would be happy to have a conversation with you about your cybersecurity strategy. Contact us today.

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

Cybersecurity strategies banner, stratégie cybersécurité

Top 5 Cybersecurity Strategies for Your Business

Whether it’s our personal identity, our banking, or possessions in our home, security is a topic we all think about every day. But are you…

Read More
Managed Services Gérés

How Managed Services Can Help Your Business During COVID-19

Businesses across the globe are heavily reliant on technology to maximize their efficiency. This has become more evident during this COVID-19 pandemic. The dependence on…

Read More
IT staffing

The Advantages of IT Resourcing Services for SMBs

Leveraging technology to achieve business goals is essential to SMBs. Technology helps businesses differentiate and compete in their respective industries and markets. It enables them…

Read More

What SMBs Should Expect From Today’s IT Service Providers

The role of an IT service provider has changed over the years. It used to be that it was enough to just be good with…

Read More
Courriels malveillants

How To Recognize Warning Signs Of Malicious Email?

Online security is crucial in our current digital era. Malicious emails have become a pervasive threat. These sophisticated attacks can cause significant damage whether it…

Read More