<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By: Kelser on July 2nd, 2015

Print/Save as PDF

Has Your Firm Done Enough to Protect Your Network From a Data Breach?


Your data network security is like a chain - it’s only as strong as its weakest link. If you’ve poured ample effort into protecting one aspect, like password protection, but lacked in other data security areas, then your security front may not be as strong as you think.

If the information below is beyond your technical knowledge, hop over to our non-tech tech guide: Cyber Security: A Non-Technical Guide.

Has YOUR Firm Done Enough to Protect your Network from a Security Breach?

Far too many corporations have found after a security audit that their network security has holes in the following areas:

1.Data Security Encryption

Even the largest corporations can experience network security breaches and data intrusions. The best way to prepare for this possibility is to encrypt your data. Consider data masking that transforms data via techniques that are applied primarily to non-production environments.

2.Network Admin Loopholes

Network admins are a common cyber attack point as they have more rights and permissions than most users. Often admins can traverse firewalls and even pass data security encryption. Employing an identity-based threat detection model can use usage patterns on specific accounts to find suspicious activity.

3.System Anomalies

‘Suspicious activity’, or system anomalies, can be used to determine more than just network admin cyber attacks. They’ve been used for years to determine the expected payload of certain users. Despite our long-standing ability to measure this activity it is too commonly overlooked. Many companies spend large quantities of money on fancy software to detect new threats but this old standby shouldn’t be forgotten.

4.Data Exfiltration

Security breaches will find your weakest security point and infiltrate your network—but your frontline isn’t the only line of defense. Prevent data exfiltration and data loss with security event management solutions.

5.Access Controls

Limit access to files that are executable to only the users who require them. This will help eliminate threats from self-extracting files.

6.Document Scrubbing

Files like PDF and office docs are commonly used to launch an intrusion. Avoid this issue by regularly scrubbing your documents.

7.Don’t Brag About Your Cyber Security

While many companies are tempted to advertise their security architecture for bragging rights—avoid the temptation. Any information on your system can help a hacker tailor their cyber attack to your architecture.

Bonus: for more tips on cybersecurity, check out our quiz.

If you’ve questioned your defenses against any of the above—your network could be vulnerable. Not to use too many clichés, but your best offense truly is a good defense. Strongly consider performing on-going security tests via security audits. These will help you discover vulnerabilities, and offer solutions on how to patch holes in your frontline.

Whether you’d like to find potential security holes, or you’ve already experienced a system breach—we can help.

New Call-to-action

About Kelser

By actively listening to the client, Kelser has consistently met the needs of its client base for over 30 years. Through attentive observation of the changing industry, Kelser is able to react quickly to provide the best service and solutions available. Thanks to the dedication of our professional staff, this agility has advanced us as leaders in our industry.

Suggested Posts

Visit Our Learning Center