Intelligent Tech Channels Issue 21 | Page 19

ENTERPRISE TECHNOLOGY The nine most vital network security best practices Issue 21 The network security best practice checklist 1. MAINTAIN YOUR SOFTWARE Network attacks are evolving and yesterday’s solutions may not be enough to counter tomorrow’s threats. This is why one of the most essential — yet most basic — network security best practices is keeping your antivirus software current. Up-to- date virus software will incorporate tested solutions to some of the most recent known exploits. As such, software updates should INTELLIGENT TECH CHANNELS is that there are measures you can take to protect your business against the range of cybersecurity dangers that threaten it. We’ve compiled them into a single list of nine network security best practices. Read on to see how with a little prevention you can optimise your network security plans. T hanks to the Internet, individuals, businesses and computer systems can now share sensitive data among one another more easily than ever before, but there’s a downside to this near universal connectivity: network attacks are becoming more and more prevalent. According to a recent PwC Global Economic Crime Survey, 32% of organisations have experienced illegal data breaches, making cybercrime the second-most reported economic crime in the world. At the same time, IBM reports that within the US, the average data breach ends up costing the targeted business approximately US$7.35 million. Attacks are becoming more frequent. With so many threats and so much at stake, even the best network security teams are struggling to keep up. The good news Sam Kumarsamy, Senior Product Marketing Manager, Gigamon, says it’s an old truism that an ounce of prevention is worth a pound of cure. He adds that while this saying is relevant in most aspects of daily life, it becomes especially appropriate when applied to business network security. ar sa my , Se n io r Pr oduct M arketi am Gig er, nag a M ng on be installed immediately as they become available. The most effective antivirus options can protect you in over 90% of instances. However, no single solution is fool proof, and as threats become more advanced, ongoing antivirus audits and supplemental systems are becoming just as important as installing the latest patches. 2. MAKE VISIBILITY YOUR TOP PRIORITY We tend to view our networks as walled fortresses trying to repel incoming enemy attacks, but sometimes it’s the people inside the walls who are the bigger danger. Nearly 75% of all data breaches are a direct result of insider threats and, of those threats, 68% can be attributed to employee or contractor negligence (only 22% of insider-threats are intentional). The solution? Improved network visibility. Constantly monitoring users 19