Solved

Initial Guide to Network Security

Posted on 2016-09-20
7
22 Views
Last Modified: 2016-10-12
I am a lone IT guy working for a small company with about 20 computer users on an Internet-connected LAN.  In light of all the public hacks lately, my management is looking for me to provide them with a two-page summary of what our options are to deal with potential threats to our network.  For now, we are mostly concerned with external, Internet-based threats and intrusions.  

I have knowledge about networking but am not a network security professional.  I need a preliminary, overall, general guide book as to the resources available to someone in my position.
0
Comment
Question by:jd1114
7 Comments
 
LVL 28

Accepted Solution

by:
Bill Bach earned 200 total points (awarded by participants)
ID: 41807540
"Network Security for Dummies" is a good starter text.

Your options are simple:
- You need a good firewall at a bare minimum
- A network edge security/inspection device is a really good idea, too.  You can get two in one though solutions like an Untangle appliance.  This adds a lot to the cost, but it is well worth it to block malware at the edge of the network.
- You need a good malware scanner on each machine.
- You need good USER TRAINING -- to teach people what a "bad" email looks like.  This is actually more important than a malware scanner!  If you keep people from opening up the malware in the first place, it reduces your attack footprint considerably.  (Try www.knowbe4.com for ideas.)
- You need solid backups most of all.  You need multiple off-line copies (for archive, and to keep them safe from malware), and you can leverage on-line replication technologies for improved RPO as well.  Replication can also aide in disaster recovery, whether you move the data to the cloud or to a server in the owner's home.

Beyond that, it's really about multiple layers of protection -- multiple backups, multiple scanners, etc., and staying within a reasonable budget.
0
 
LVL 3

Assisted Solution

by:awed1
awed1 earned 75 total points (awarded by participants)
ID: 41807576
20 users on an Internet connected LAN, does that mean that there is no office where a server etc. resides.
If there is an office with a server, a firewall appliance is essential.
Also, enforced password protection which require one to log back into the computer after a short period of time is essential.

For a short summary, this does not look too intimidating: http://www.networkworld.com/article/2274081/lan-wan/chapter-1--overview-of-network-security.html It is only two web-pages long.
0
 
LVL 1

Assisted Solution

by:gaspan
gaspan earned 75 total points (awarded by participants)
ID: 41807590
Bill did provide you with a good startup guide. Alternatively you can also look at a comprehensive Cloud managed service like Webroot that provides you with all the protection you need including real-time updates and threat intelligence. Managing network security can be a full time job even for a small network, so sometimes outsourcing makes lots of sense. Looking at a solution like this, will pretty much also summarize the threats you need to worry about
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 
LVL 23

Assisted Solution

by:Eirman
Eirman earned 75 total points (awarded by participants)
ID: 41807648
"You need multiple off-line copies" .... Just to be clear ..... offline means not even connected to a network.
-----------------------------------------------------------------------------------------------------------------------
I highly recommend that paid-for version of this product is installed on each PC
https://www.foolishit.com/cryptoprevent-malware-prevention/
It's great value as it's a once-off purchase with no ongoing fees.
---------------------------------------------------------------------------------------------
Make sure that NO PC is running with Administration rights unless it is needed at that point in time.
0
 

Assisted Solution

by:shedrack okpara
shedrack okpara earned 75 total points (awarded by participants)
ID: 41807724
Hi, just to add to what they have said, being the only IT guy in the company you have to be partly paranoid about almost everything because a user (co-worker) not being IT savvy can easily compromise your network even by just clicking an ad from a web page.... i would strongly advice you practice with your own virtual lab thats what i used and still using, then apply the skill from the resources that has been suggested to, the fun thing about a virtual lab or environment is that you can go crazy with imaginations of ways you feel your network can be compromised.NOTE dont link your hypervisor to your production network, make your test lab a closed network.If u need help on how to set up a lab you can contact me for a one on one
0
 

Author Comment

by:jd1114
ID: 41811546
Thanks everyone for all the great help.  Does anyone have experience with network security companies such as FireEye, CrowdStrike, or LastLine?
0
 
LVL 23

Expert Comment

by:Eirman
ID: 41839750
Seems like a fair distribution of points to me.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
Read about achieving the basic levels of HRIS security in the workplace.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now