Best practices for cybersecurity and network health in 2023

Issue 8 2022 Infrastructure

Cybersecurity threats are at an all-time high, becoming more frequent and more sophisticated. According to a 2021 Interpol report,[1] 90 percent of African businesses are operating without the necessary cybersecurity protocols, leaving them exposed to cyberattacks. A cybersecurity breach can be devastating to any business, which is why it is crucial that organisations understand their weaknesses and have a plan to limit vulnerabilities.


Marcel Bruyns.

Knowing how to recognise vulnerabilities and ensuring good network health is important. However, securing a network from outside threats while making it easily accessible to employees can be challenging. What are the tell-tale signs of poor network security, and what should organisations do to secure their networks?

Signs of poor network health

A network with poor security is an easy target for hackers, and increases the risk of viruses, malware, data breaches and many other cyberthreats. By proactively monitoring and responding to threats, organisations can build a cohesive cybersecurity plan with the right policies and procedures to keep their networks in good shape. Even with the right policies, it is important to ensure that IT and security teams are aligned.

Often, IT, security teams, and other employees do not speak the same language. There may be different policies for different networks, a lack of policies, or inconsistent policy application. An IP surveillance network, for example, might not be using secure real-time protocol (SRTP) or hypertext transfer protocol secure (HTTPS) for encrypting communications to network devices, leaving a weak spot for cybercriminals to exploit.

It may not be clear who is responsible for keeping security devices patched and updated, or network users may not be aware of (or following) security policies and procedures. According to the 2020 Security Megatrends report,[2] 77 percent of data security breaches were caused by internal employees – and 83 percent of those breaches were accidental. Organisations should have policies that are documented so all users can understand them easily. It should be clear who is accountable for the physical security of network devices, as well as the updates, maintenance, and security patches for those devices. One compromised network device could compromise an entire network, so every device needs the same level of protection as the overall IT network.

Best practices for a healthy network

Common cybersecurity risks are easily mitigated. Using strong, unique passwords for network devices is a good place to start. Most IP-based devices are shipped with default passwords and default settings; a common weakness that cybercriminals exploit to access a network. Organisations should change these default passwords to strong passwords, update passwords regularly, and use certificates to encrypt them.

Any network device (including laptops, servers, printers, or surveillance cameras) should be kept up to date with the latest application firmware. New bugs or exploits are constantly discovered. Fortunately, good manufacturers post common vulnerabilities and exposure reports almost immediately when they do occur. However, if a device is not regularly updated, these exploits will leave an organisation at risk.

Securing a network perimeter supports all other cybersecurity efforts. Using network segmentation such as virtual local area networks (VLANs), for example, can prevent attacks on individual servers and network devices, while access control lists can help control malicious movement on the network. Proper physical installation of network devices is essential in maintaining cybersecurity. In a surveillance system, for example, publicly accessible network ports and SD card ports can allow criminals to circumvent network security by directly accessing those devices.

A proactive approach

As cybercriminals find more sophisticated ways to infiltrate networks, every business must bolster its IT security at every level. Organisations should conduct network risk analyses to know exactly how well they are protected, how much they could lose if their networks were compromised, and which key assets need the most protection.

Because any network device could be a potential vulnerability, organisations should engage with their technology manufacturers around cybersecurity. Equipment needs to work around your IT policy, and not the other way around, in a way that creates a secure network ecosystem with no weak links.

Most organisations do not have dedicated IT security teams or adequate security expertise to deal with today’s evolving threats. These organisations should find a trusted cybersecurity partner to guide and protect them. Cybersecurity does not have to be daunting: many attacks are unsuccessful, but only if organisations are proactive in their approach to network health and security.

[1] www.interpol.int/content/download/16759/file/AfricanCyberthreatAssessment_ENGLISH.pdf

[2] 2020 Security Megatrends Report by the Security Industry Association


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...
A whole-site solution to crack the data centre market
Fire & Safety Infrastructure Facilities & Building Management
Fire safety consultants and contractors who can offer a comprehensive fire safety solution to the data centre market can establish themselves as a supplier of a key safety features that help guarantee the smooth operation of critical infrastructure.

Read more...
Wireless network security market
Infrastructure
The wireless network security market is experiencing significant growth, driven by the increasing adoption of wireless technologies, a surge in cyberthreats, and rising demand for secure data transmission.

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
Managing stock efficiently and cost-effectively
Asset Management Infrastructure Logistics (Industry)
Rina Redelinghuys, customer services executive at Cquential, a member of the Argility Technology Group, examines stock management across various industries, including retail, fast-moving consumer goods, food and dairy, automotive, apparel, industrial, accessories, paint and chemicals, and pharmaceuticals.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.