With so much network infrastructure to look after, today’s IT professionals are pulled in every direction. Keeping servers running, maintaining software and ensuring that employees can simply do their jobs without disruption are the key requirements that come under the heading of “IT infrastructure management”.
Securing IT Infrastructure
Everyday operational support for IT infrastructure is only part of the picture. At the heart of infrastructure management sits security. Keeping data traffic flowing and ensuring only authorised users can gain access to sensitive documents means investment in a whole range of security solutions.A Multidimensional Problem
Network users are commonly the source of data breach in networked organisations as they represent easy targets for hackers. Using a combination of security technologies, monitoring and event management solutions, security assessments and user training are all equally important in maintaining a strong infrastructure security position.
Data leakage can arise from human error as much as it can from a targeted attack. To prevent data leakage, firms can narrow down the risk by discovering and categorising your data according to its sensitivity, identifying what risks exist at the user level – and mitigating them – and ensuring that any data shared outside your organisation is encrypted.Managing Your DLP Measures
Data leakage may be a problem across your whole infrastructure estate, so you should take steps to eliminate the risks everywhere they exist. Risk areas include hardware, applications, endpoints, gateways, on premise and cloud – and of course your network users, who should be trained in the steps they should take to minimise data leakage risk. The solution you use must include simple yet richly featured capabilities for managing policies across the organisation.
It's not if your network is attacked, but when. The constant onslaught of hacks and attacks targeted at out of date software raises the importance of putting a comprehensive patching policy in place beyond critical. It needs to address not just Microsoft applications but all your other software and systems running across your organisation.The Importance of Patching Policy
Every organisation needs a ‘patch policy’ to ensure that software is kept updated. It’s highly advisable to invest in a patch management solution to help manage the sheer volume of patches, to keep track of what software version is on which machine so that the right machines and software are updated at the right time – and can be rolled back if necessary.
SIEM (Security Information and Event Management) software is important for organisations that maintain large databases of confidential information such as customer personal data, patient records or financial statistics. It allows network managers to bring data together from applications, databases, or infrastructure and create an actionable picture of potential threat sources.
Complete Operational Infrastructure Visibility
Armed with the a SIEM platform to collect, analyse, and monitor the data generated by disparate business systems such as end-user devices, servers, network equipment, firewalls, antivirus and intrusion prevention systems, IT managers can have a complete operational visibility and event insights. LogPoint provides all of this via a single management console for compliance, security, monitoring and insights.
This buyer’s guide is intended to outline best practice when procuring penetration testing to ensure you have enough knowledge about what to look for in a potential pen test provider, along with a set of questions you can ask to help you make an informed decision
Insider threats are a major source of data breach. Without the visibility to see who is doing what on the network – whether deliberately or by accident – IT administrators cannot hope to control these threats. UEBA technology delivers detailed insights and analytics on network user behaviour to network and security administrators so they can detect the tell-tale signs of an impending breach.User Analytics for Actionable Intelligence
User and entity behavioural analytics alone are not enough to prevent a data breach. Which is why the best UEBA solutions enable complete monitoring and analysis of software and system usage by employees to deliver actionable intelligence based on impact scores. Impact scores allow security teams to prioritise the action they take based on usage anomalies as well as the sensitivity of the information that is potentially at risk.
"Cybersecurity is not an issue I need to worry about — we’ve got an expert IT that takes care of all that kind of thing”. Too many employees think like this, and hackers are fully aware of it. They target human weaknesses to achieve their goals. So it is important to train and assess employees regularly on best practice behaviours which will keep their — and the organisation’s — data secure.Helping Network Users Secure Themselves — and the Organisation
While training can go far in protecting unwitting network users against hacking susceptibility, they may still be duped into giving away passwords and other sensitive information. This is why enforcing certain security policies at critical points, such as logon to the corporate network, access to the internet and web-based applications and for email access can play a major role in the organisation’s security stance.
Visibility and Access
Controlling access to your network is difficult when you know what devices are trying to connect. If you don’t know which people are using what device to connect to the network, your “attack surface” is increased significantly so you need complex and intelligent solution to detect and then allow or block these devices. This visibility is needed in real time, so you don’t block genuine and authorised devices.
Balancing Device Visibility with Network Access Control
Nothing less than 100% visibility of devices is good enough. But then you need to control access to the network on an ongoing basis for those devices. This needs to be done in such a way that it doesn’t create a delay in access for the ‘good’ devices and users, and that it doesn’t create a massive new overhead for IT staff. Key to this is the use of ‘agentless’ technology.
Staying Secure Online
Our Information Security Officer, Joseph Ball regularly writes articles on different aspects of security. Joe's articles have proven to be really popular with our own people and he's often asked if they can be shared with colleagues outside of Chess. With this in mind, I thought it may be something you are interested in.
Capturing Requirements in a Virtual Workshop
Until March this year, the assumption was that we could meet in person with a client or project partner several times to move through the requirements definition process. As it turns out, the process of developing a new digital approach which utilises a combination of existing and emerging tools has evolved like a project in itself. These are our tips.
Critical Thinking and Confirmation Bias
I'm not a supporter of #DeleteFacebook because it's like saying if you don't want to get electrocuted, get rid of electricity. It's stupid. No, demand better standards for your electricity, so you don't get electrocuted…" – Christopher Wylie, Cambridge Analytica whistle-blower
Chess Wins Two Cybersecurity Awards
The Chess team have proven the invaluable work they do and have been recognised for their outstanding performance and commitment to securing organisations, by picking up two awards in the Sophos Partner Awards 2020 - Public Sector Partner of the year and Education Partner of the year.