Is your organization carelessly leaving its networks vulnerable to invasion? Check out these five common oversights to see if your resources are at risk.
Strong network security is essential, yet creating and maintaining bulletproof network protection remains an elusive goal for many enterprises.
Ensuring that every potential gap is securely sealed continues to be a challenge for organizations of all types and sizes. Even more distressing is the fact that many enterprises fail to take some basic actions that would keep their networks safe from infiltration and attack. Here's a look at the five leading ways enterprises inadvertently compromise their network security, and how to fix those oversights.
1. Relying on a single solution to patch a vulnerability
It's not enough to simply identify a gap and then buy a hardware or software widget to fill the breach. "Security pros must expect to encounter events that threaten network security and implement continuous testing accordingly to ensure the device in question will not be compromised," said Kurt Alaybeyoglu, a senior associate at The Chertoff Group, a global security advisory firm. "Otherwise, an organization will waste its precious, often scant, security budget," he added.
Not only is it a waste of money to purchase a widget without deploying controls assurance testing, but there's also the waste created by evaluating and installing the widget and conducting employee training, Alaybeyoglu explained. Even worse is that without continuous testing and management, IT is providing a false sense of security to enterprise directors by claiming that the organization is now protected against the tactics, techniques, and procedures (TTPs) that the investment was meant to address.
2. Using a VPN as a security band-aid
Read the full article on Network Computing.
About the Author(s)
You May Also Like
The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024