Best practices for cybersecurity and network health in 2023

Issue 8 2022 Infrastructure

Cybersecurity threats are at an all-time high, becoming more frequent and more sophisticated. According to a 2021 Interpol report,[1] 90 percent of African businesses are operating without the necessary cybersecurity protocols, leaving them exposed to cyberattacks. A cybersecurity breach can be devastating to any business, which is why it is crucial that organisations understand their weaknesses and have a plan to limit vulnerabilities.


Marcel Bruyns.

Knowing how to recognise vulnerabilities and ensuring good network health is important. However, securing a network from outside threats while making it easily accessible to employees can be challenging. What are the tell-tale signs of poor network security, and what should organisations do to secure their networks?

Signs of poor network health

A network with poor security is an easy target for hackers, and increases the risk of viruses, malware, data breaches and many other cyberthreats. By proactively monitoring and responding to threats, organisations can build a cohesive cybersecurity plan with the right policies and procedures to keep their networks in good shape. Even with the right policies, it is important to ensure that IT and security teams are aligned.

Often, IT, security teams, and other employees do not speak the same language. There may be different policies for different networks, a lack of policies, or inconsistent policy application. An IP surveillance network, for example, might not be using secure real-time protocol (SRTP) or hypertext transfer protocol secure (HTTPS) for encrypting communications to network devices, leaving a weak spot for cybercriminals to exploit.

It may not be clear who is responsible for keeping security devices patched and updated, or network users may not be aware of (or following) security policies and procedures. According to the 2020 Security Megatrends report,[2] 77 percent of data security breaches were caused by internal employees – and 83 percent of those breaches were accidental. Organisations should have policies that are documented so all users can understand them easily. It should be clear who is accountable for the physical security of network devices, as well as the updates, maintenance, and security patches for those devices. One compromised network device could compromise an entire network, so every device needs the same level of protection as the overall IT network.

Best practices for a healthy network

Common cybersecurity risks are easily mitigated. Using strong, unique passwords for network devices is a good place to start. Most IP-based devices are shipped with default passwords and default settings; a common weakness that cybercriminals exploit to access a network. Organisations should change these default passwords to strong passwords, update passwords regularly, and use certificates to encrypt them.

Any network device (including laptops, servers, printers, or surveillance cameras) should be kept up to date with the latest application firmware. New bugs or exploits are constantly discovered. Fortunately, good manufacturers post common vulnerabilities and exposure reports almost immediately when they do occur. However, if a device is not regularly updated, these exploits will leave an organisation at risk.

Securing a network perimeter supports all other cybersecurity efforts. Using network segmentation such as virtual local area networks (VLANs), for example, can prevent attacks on individual servers and network devices, while access control lists can help control malicious movement on the network. Proper physical installation of network devices is essential in maintaining cybersecurity. In a surveillance system, for example, publicly accessible network ports and SD card ports can allow criminals to circumvent network security by directly accessing those devices.

A proactive approach

As cybercriminals find more sophisticated ways to infiltrate networks, every business must bolster its IT security at every level. Organisations should conduct network risk analyses to know exactly how well they are protected, how much they could lose if their networks were compromised, and which key assets need the most protection.

Because any network device could be a potential vulnerability, organisations should engage with their technology manufacturers around cybersecurity. Equipment needs to work around your IT policy, and not the other way around, in a way that creates a secure network ecosystem with no weak links.

Most organisations do not have dedicated IT security teams or adequate security expertise to deal with today’s evolving threats. These organisations should find a trusted cybersecurity partner to guide and protect them. Cybersecurity does not have to be daunting: many attacks are unsuccessful, but only if organisations are proactive in their approach to network health and security.

[1] www.interpol.int/content/download/16759/file/AfricanCyberthreatAssessment_ENGLISH.pdf

[2] 2020 Security Megatrends Report by the Security Industry Association


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.