Security in the network environment - February 2014 - Hi-Tech Security Solutions
classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017

Security in the network environment
February 2014, IT infrastructure

Threats to network security are escalating dramatically. Technology advancements in social media, mobile devices, Wi-Fi and cloud services are increasing a company’s vulnerability to attacks. Cyber risks and cyber threats are a major concern for large revenue-generating organisations.

It is therefore crucial for organisations today to become more proactive and to invest in technologies that secure their networks and company data.

“To mitigate the risk of attacks, companies are now forced to improve security policies, that will ensure employees abide by rules that will protect the organisation’s technology and information assets,” says Laura Niehaus, project manager for EES, an ISO 9001:2008 certified company, which provides project management for the provision of information communication technology (ICT) solutions.

“These security policies are driven from the highest level in an organisation with security professionals who are frequently advising on security matters and compliance monitoring.”

Even though organisations are moving in the right direction, there is still a need to analyse the current state of security in the network environment and identify areas of improvement. Health assessments focus on current threats and also help recognise potential new threats.

Access control

One of the ways in which network administrators control access to company data is by assigning user names and passwords. Standard security measures such as firewalls and proxy servers enforce access policies allowing users access to those services which they are entitled to.

“Although standard measures are effective in preventing unauthorised access, further systems are required to help detect and prevent harmful content,” Niehaus explains. “Intrusion detection systems, for example, should be used to detect malicious activity or intrusion attempts by outsiders and then log the activity for auditing purposes. Perimeter networking or demilitarised zones (DMZ) are also important in acting as a gateway to the public Internet and provides services to users outside of the local area network, such as e-mail and Web.”

Key threats to network security

Data leakage, data loss prevention and data protection are major concerns. “Organisations usually cover data protection in contracts with third-party vendors who have access to the company’s data,” Niehaus states. “Organisations should always implement enforceable contract clauses to make vendors responsible and accountable for information security that aligns to ISO standards.

“Employee negligence or lack of awareness also poses a serious threat to confidential data. Organisations are developing and implementing policies to ensure a more responsible attitude by employees to confidential information.”

In large organisations it is important to increase the awareness of information security, integral to which is training, in order to improve policies. Employees need to be aware of their responsibilities and the correct use of company assets and data. Companies must employ staff which have the right skills and competencies to support security policies and to make information security part of their performance assessments.

However, the trend of using personal smart devices for business purposes, allowing company information to leave the premises without authorisation, counters the principles of safeguarding sensitive data. Confidential data leaks can be the result of misplaced smartphones or tablets. This enables the introduction of malicious software into a company’s network, which could present damaging consequences.

Going forward

There is a great need to align security strategy with business strategy. It is vital to be more proactive and explore new technologies that can help prepare for the future. Processes need to be documented and communicated when opportunities for improvement arise, and budgets need to be made available to implement new security measures.

“Organisations need to shift their focus to security improvements, which will enable them to establish a framework for continuous improvement, proper governance, process, training and awareness.”

In conclusion, it is crucial to continually re-assess new technologies and threats, and always remain vigilant and listen to what is happening in the market.

  Share via Twitter   Share via LinkedIn      

Further reading:

  • Two-way radios – over and out?
    August 2018, Technews Publishing, This Week's Editor's Pick, IT infrastructure, Security Services & Risk Management, Residential Estate (Industry), Products
    They may have a long history, but 2-way radios are still a mainstay of effective communications for security personnel on estates.
  • Time to cut the cord?
    August 2018, Technews Publishing, This Week's Editor's Pick, IT infrastructure, Residential Estate (Industry)
    Wireless networking offers guaranteed performance, easier installation and quality of service across large areas if planned and rolled out correctly.
  • The tough keep going
    August 2018, Technews Publishing, Access Control & Identity Management, Fire & Safety, IT infrastructure
    There are problems the manufacturing industry has to face, but the good news is there are also success stories out there.
  • Control physical access to rack level
    August 2018, This Week's Editor's Pick, Access Control & Identity Management, Asset Management, EAS, RFID, IT infrastructure
    Within the data centre environment, preventing unauthorised physical access to sensitive data is crucial to maintain security and keep audit logs of who had access and when.
  • Effective monitoring can save your UPS
    August 2018, Pelco by Schneider Electric, IT infrastructure, Security Services & Risk Management, Products
    While UPSs are designed to be durable and dependable, maximising their potential requires that they are properly looked after.
  • Schneider Electric introduces Easy UPS 3S
    August 2018, Pelco by Schneider Electric, IT infrastructure, Products
    Schneider Electric South Africa has announced the launch of the Easy UPS 3S in Africa, a 10-to-40 kVA Uninterruptible Power Supply (UPS) that offers robust electrical specifications and compact design.
  • Advances in NVR and VMS capabilities
    July 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, IT infrastructure, Products
    Hi-Tech Security Solutions looks at what the latest trends are in the NVR and VMS worlds, along with some of the latest products.
  • Securing your digital assets
    July 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, IT infrastructure
    Cyberattacks can’t be prevented, but companies and individuals have ways to keep the attackers out. However, the coming year will see more attacks and more losses because of poor cyber planning.
  • The fastest Plus series NAS
    July 2018, IT infrastructure
    Synology has launched the DiskStation DS1618+, a 6-bay NAS featuring a quad-core Intel Atom processor C3538 and 4 GB DDR4 non-ECC SODIMM RAM, upgradable to 32 GB and 192 TB of storage.
  • The data explosion has just begun
    July 2018, Seagate Technology, IT infrastructure, Integrated Solutions, Products
    Data generated globally will grow to 163 zettabytes (ZB) in 2025; 163 ZB is like watching the entire Netflix catalogue 489 million times.
  • Seagate launches AI hard drives
    July 2018, Regal Distributors SA, IT infrastructure, Products
    The Seagate SkyHawk AI range is ideal for intensive computational workloads that typically accompany AI work streams.
  • New line of network switches
    July 2018, UTC Fire & Security, IT infrastructure, Products
    UTC has announced the availability of four new network switches, expanding the company’s current line of network products.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.