Tech Article

Foolproof initiatives to boost your network security

You have firewalls and antivirus software. You implement security patches regularly, and even have IDS. You may think you're doing all you can to protect your network, but think again. Security dangers you're not even aware can be lurking in every corner of your network. Security expert Dave Piscitello presents the top ten practical guidelines you can put into place today to protect your network and critical data in the future.

  1. Adopt a risk management methodology – ou can't know what to protect and how much to spend if you don't know what assets are at risk.
  2. Layer your security measures – Complement firewalls with host and application security.
  3. Compartmentalize your network and data – Would you put a screen door on a submarine?
  4. Implement stronger authentication – Authentication is the enabler of all security, so firm it up!
  5. Implement admission and endpoint controls – Only allow devices that pass admission criteria to connect to your network.
  6. Improve the granularity of your access controls – Carte blanche access is a recipe for disaster.
  7. Develop a secure software methodology – Secure code review and testing are as important to Web applications as operating systems.
  8. Be proactive with security – Routinely scan networks, servers and clients.
  9. Develop an "attack anticipation" mentality – Prevention is better than detection.
  10. Ensure information integrity, privacy, availability – If you can't make your data accurate and available to authorized users only, what's the point of networking at all?

Check out Dave's full-length presentation here.


Dave Piscitello is an authority on network security with more than 30 years experience in data networking and telecommunications. Dave is President of Core Competence Inc., founder and program manager of The Internet Security Conference, and chairman of Networld+Interop's Security Conference. Dave has authored books on internetworking and remote access, and regularly publishes articles on a variety of subjects including switched internetworking, ATM and Gigabit Ethernet, Internet security, and virtual private networking.

This was first published in May 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: