Before we start, let’s define what we’re talking about. The term security breach can conjure up all sorts of meanings, but I’d like to focus on how it relates to information technology. So by definition –

Security Breach: A situation where an individual intentionally exceeds or misuses network, system, or data access in a way that negatively affects the security of the organization’s data, systems, or operations .

When it comes to data breaches, the risk to organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company’s brand and customer loyalty.

Let’s look at some ways that will significantly increase the effort required to breach the security of your network and computers.

Change default passwords

It’s amazing how many devices and apps are protected by default usernames and passwords. Attackers are also well aware of this phenomenon. Not convinced? Do a web search for default passwords and you’ll see why you need to change them. Using a good password policy is the best way to go; but any string other than the default offer is a big step in the right direction.

Never reuse passwords

On more than one occasion, you must have come across situations where the same username and password combination was used over and over again when you realized it was easier. But if you know this, I’m pretty sure the bad guys know it too. If they get a username and password combination, they’ll try somewhere else. Don’t make it so easy for them.

Look beyond IT security as you assess your company’s data breach risks.

To eliminate threats throughout the organization, security must go beyond the IT department. A business must assess employee exit (HR) strategies, remote project protocol, on- and off-site data storage practices, and more, then establish and enforce new policies and procedures and appropriate physical safeguards for employees. findings.

Establish a comprehensive data loss protection plan

Your efforts will demonstrate to consumers and regulators that your organization has taken early action to address data security threats. Disseminate this plan throughout the management structure to ensure that everyone knows what to do in the event of non-compliance.

Review security logs

Good administrators know the baseline and try to review system logs on a daily basis. Since this article is about security breaches, I’d like to put a special emphasis on security logs, as they are the first line of defense.

Perform regular network scans

Comparing regular network scans to an operational baseline inventory is invaluable. It allows the administrator to know at a glance if and when any unauthorized equipment has been installed on the network.

One method of scanning the network is to use Microsoft’s built-in command network view. Another option is to use free programs like NetView. They are usually in GUI format and tend to be more informative.

Provide training and technical support to mobile workers.

Ensure the same standards for data security apply regardless of location by providing mobile workers with simple policies and procedures, ensuring security and authentication software is installed on mobile devices and kept up to date, and providing adequate training and technical support for mobile workers.

Keep your security software (or patches) up to date.

An unpatched system, by definition, operates with a weak point waiting to be exploited by hackers. It’s true that patching takes time and resources, so senior management needs to provide guidance on assignments and expectations.

Don’t rely on encryption as your only method of defense.

Encrypting data in transit and at rest is a good practice, but when used alone, it can give businesses a false sense of security. Although most state statutes require notification only if a breach compromises unencrypted personal information, professionals can and do crack encryption codes.

Monitor outgoing network traffic

Malware is becoming sophisticated enough to avoid detection. One method to expose it is to monitor outgoing network traffic. Suspicion should arise when the number of outgoing connections or the amount of traffic deviates from the normal baseline operation. In fact, it may be the only indication that sensitive information is being stolen or that an email engine is actively spamming.

These methods are easy to implement and will surely go a long way in making it more difficult for a security breach to occur.

Leave a Reply

Your email address will not be published. Required fields are marked *