Best practices for cybersecurity and network health in 2023

Issue 8 2022 Infrastructure

Cybersecurity threats are at an all-time high, becoming more frequent and more sophisticated. According to a 2021 Interpol report,[1] 90 percent of African businesses are operating without the necessary cybersecurity protocols, leaving them exposed to cyberattacks. A cybersecurity breach can be devastating to any business, which is why it is crucial that organisations understand their weaknesses and have a plan to limit vulnerabilities.


Marcel Bruyns.

Knowing how to recognise vulnerabilities and ensuring good network health is important. However, securing a network from outside threats while making it easily accessible to employees can be challenging. What are the tell-tale signs of poor network security, and what should organisations do to secure their networks?

Signs of poor network health

A network with poor security is an easy target for hackers, and increases the risk of viruses, malware, data breaches and many other cyberthreats. By proactively monitoring and responding to threats, organisations can build a cohesive cybersecurity plan with the right policies and procedures to keep their networks in good shape. Even with the right policies, it is important to ensure that IT and security teams are aligned.

Often, IT, security teams, and other employees do not speak the same language. There may be different policies for different networks, a lack of policies, or inconsistent policy application. An IP surveillance network, for example, might not be using secure real-time protocol (SRTP) or hypertext transfer protocol secure (HTTPS) for encrypting communications to network devices, leaving a weak spot for cybercriminals to exploit.

It may not be clear who is responsible for keeping security devices patched and updated, or network users may not be aware of (or following) security policies and procedures. According to the 2020 Security Megatrends report,[2] 77 percent of data security breaches were caused by internal employees – and 83 percent of those breaches were accidental. Organisations should have policies that are documented so all users can understand them easily. It should be clear who is accountable for the physical security of network devices, as well as the updates, maintenance, and security patches for those devices. One compromised network device could compromise an entire network, so every device needs the same level of protection as the overall IT network.

Best practices for a healthy network

Common cybersecurity risks are easily mitigated. Using strong, unique passwords for network devices is a good place to start. Most IP-based devices are shipped with default passwords and default settings; a common weakness that cybercriminals exploit to access a network. Organisations should change these default passwords to strong passwords, update passwords regularly, and use certificates to encrypt them.

Any network device (including laptops, servers, printers, or surveillance cameras) should be kept up to date with the latest application firmware. New bugs or exploits are constantly discovered. Fortunately, good manufacturers post common vulnerabilities and exposure reports almost immediately when they do occur. However, if a device is not regularly updated, these exploits will leave an organisation at risk.

Securing a network perimeter supports all other cybersecurity efforts. Using network segmentation such as virtual local area networks (VLANs), for example, can prevent attacks on individual servers and network devices, while access control lists can help control malicious movement on the network. Proper physical installation of network devices is essential in maintaining cybersecurity. In a surveillance system, for example, publicly accessible network ports and SD card ports can allow criminals to circumvent network security by directly accessing those devices.

A proactive approach

As cybercriminals find more sophisticated ways to infiltrate networks, every business must bolster its IT security at every level. Organisations should conduct network risk analyses to know exactly how well they are protected, how much they could lose if their networks were compromised, and which key assets need the most protection.

Because any network device could be a potential vulnerability, organisations should engage with their technology manufacturers around cybersecurity. Equipment needs to work around your IT policy, and not the other way around, in a way that creates a secure network ecosystem with no weak links.

Most organisations do not have dedicated IT security teams or adequate security expertise to deal with today’s evolving threats. These organisations should find a trusted cybersecurity partner to guide and protect them. Cybersecurity does not have to be daunting: many attacks are unsuccessful, but only if organisations are proactive in their approach to network health and security.

[1] www.interpol.int/content/download/16759/file/AfricanCyberthreatAssessment_ENGLISH.pdf

[2] 2020 Security Megatrends Report by the Security Industry Association


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
Power surges are killing our networks
Duxbury Networking Infrastructure
With power surges and lightning strikes becoming an all-too-familiar threat to South African infrastructure, Duxbury Networking is calling on local installers and network integrators to follow proper grounding protocols.

Read more...
Are we over the edge?
SMART Security Solutions Axis Communications SA Hikvision South Africa IoT & Automation
SMART Security Solutions speaks to Axis Communications and Hikvision to learn what is happening on the edge of surveillance solutions. Is everything now in the cloud, or are edge devices still in demand?

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Six key security technology trends in 2025
Axis Communications SA Surveillance
Axis Communications examines some new trends for the security sector in 2025, as well as some new, old trends that are once again highlighted because of their benefit to the end user in the race to obtain optimal value from technology installations.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...