View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
October 16, 2015

5 holes in your enterprise security strategy

List: The flaws in your system just waiting to be exploited by hackers.

By Charlotte Henry

1. Insufficient DDoS Protection

If your company was the subject of a DDoS attack could your website keep running? Too many firms do not invest in proper DDoS protection, leaving them vulnerable to an attack that could stop them trading for days. Having suffient network scrubbing ability, and a system that knows the difference between good and bad traffic, is essentail.

2. Not segregating your network

Breaches happen, but companies need to make sure that by getting into one part of the network, hackers are not able to access it all. This was the problem at Sony Pictures. Having succesflly made one breach, the hackers were able to roam freely around the network. Seperate servers, storage devices, routers, and switches can help limit the damage that happens when a hacker gains entry.

3. Having a firewall but no encryption.

Some firms believe that by just putting a firewall on the perimeter they can stop the bad guys coming in. That simply is not the case anymore. As with segregating parts of the networrk, firms have to assume they are going to breached, and properly encrypt data for when it happens.

4. Corporate iPhones

All mobile devices need to protecting, but iPhones are increasingly be offered by firms, and are particularly susceptible. Using toolls like the Protected Access 2 (WPA2) Enterprise protocol for WiFi security, and Microsoft Exchange ActiveSync for securing emails.

5. Employees

The biggest flaw in any system is the humans. Whether its through social engineering or genuine human error, it’s always people that are the weakest point…and that’s before we think about internal sabotage.

Company wide education is being emphasised by many, so that staff are on board with the strategy. Make security convenient for employees, not a burden to their work, and they will use it.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU