Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Initial Guide to Network Security

Posted on 2016-09-20
Medium Priority
Last Modified: 2016-10-12
I am a lone IT guy working for a small company with about 20 computer users on an Internet-connected LAN.  In light of all the public hacks lately, my management is looking for me to provide them with a two-page summary of what our options are to deal with potential threats to our network.  For now, we are mostly concerned with external, Internet-based threats and intrusions.  

I have knowledge about networking but am not a network security professional.  I need a preliminary, overall, general guide book as to the resources available to someone in my position.
Question by:jd1114
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 28

Accepted Solution

Bill Bach earned 800 total points (awarded by participants)
ID: 41807540
"Network Security for Dummies" is a good starter text.

Your options are simple:
- You need a good firewall at a bare minimum
- A network edge security/inspection device is a really good idea, too.  You can get two in one though solutions like an Untangle appliance.  This adds a lot to the cost, but it is well worth it to block malware at the edge of the network.
- You need a good malware scanner on each machine.
- You need good USER TRAINING -- to teach people what a "bad" email looks like.  This is actually more important than a malware scanner!  If you keep people from opening up the malware in the first place, it reduces your attack footprint considerably.  (Try www.knowbe4.com for ideas.)
- You need solid backups most of all.  You need multiple off-line copies (for archive, and to keep them safe from malware), and you can leverage on-line replication technologies for improved RPO as well.  Replication can also aide in disaster recovery, whether you move the data to the cloud or to a server in the owner's home.

Beyond that, it's really about multiple layers of protection -- multiple backups, multiple scanners, etc., and staying within a reasonable budget.

Assisted Solution

awed1 earned 300 total points (awarded by participants)
ID: 41807576
20 users on an Internet connected LAN, does that mean that there is no office where a server etc. resides.
If there is an office with a server, a firewall appliance is essential.
Also, enforced password protection which require one to log back into the computer after a short period of time is essential.

For a short summary, this does not look too intimidating: http://www.networkworld.com/article/2274081/lan-wan/chapter-1--overview-of-network-security.html It is only two web-pages long.

Assisted Solution

gaspan earned 300 total points (awarded by participants)
ID: 41807590
Bill did provide you with a good startup guide. Alternatively you can also look at a comprehensive Cloud managed service like Webroot that provides you with all the protection you need including real-time updates and threat intelligence. Managing network security can be a full time job even for a small network, so sometimes outsourcing makes lots of sense. Looking at a solution like this, will pretty much also summarize the threats you need to worry about
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

LVL 24

Assisted Solution

Eirman earned 300 total points (awarded by participants)
ID: 41807648
"You need multiple off-line copies" .... Just to be clear ..... offline means not even connected to a network.
I highly recommend that paid-for version of this product is installed on each PC
It's great value as it's a once-off purchase with no ongoing fees.
Make sure that NO PC is running with Administration rights unless it is needed at that point in time.

Assisted Solution

by:shedrack okpara
shedrack okpara earned 300 total points (awarded by participants)
ID: 41807724
Hi, just to add to what they have said, being the only IT guy in the company you have to be partly paranoid about almost everything because a user (co-worker) not being IT savvy can easily compromise your network even by just clicking an ad from a web page.... i would strongly advice you practice with your own virtual lab thats what i used and still using, then apply the skill from the resources that has been suggested to, the fun thing about a virtual lab or environment is that you can go crazy with imaginations of ways you feel your network can be compromised.NOTE dont link your hypervisor to your production network, make your test lab a closed network.If u need help on how to set up a lab you can contact me for a one on one

Author Comment

ID: 41811546
Thanks everyone for all the great help.  Does anyone have experience with network security companies such as FireEye, CrowdStrike, or LastLine?
LVL 24

Expert Comment

ID: 41839750
Seems like a fair distribution of points to me.

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question