Five ways to secure your network

Source: Internet
Author: User
Keywords Security assurance means firewalls network security anti-virus
1. Write down your security strategy excellent security cannot happen overnight. If your corporate culture tends to be informal, it's basically luck to achieve good security. To obtain the best enterprise safety, we must undergo unremitting efforts, as well as strong determination. Each company needs a security policy. Don't wait for the invasion, to think about making this strategy; Visit the WatchGuard Security Awareness Web site, which provides a free white paper that describes how to develop your strategy (PDF) while eliminating expensive expert consulting fees or a few quarters of your own groping. 2. Firewalls are essential surprisingly, many organizations (most typically universities) are now running public networks without firewall protection. Let's just ignore the argument that the "hardware firewall is good or the software firewall is good", no matter what kind of firewall is used, it is better than no firewall. The point here is that everyone connected to the Internet needs to take certain steps at their network entrance to block and discard malicious network traffic. When you read this article, you already have a corporate firewall. But don't forget your remote office staff and mobile users. At the very least, each of them should be equipped with a personal firewall. While Windows XP SP2 's own firewall is barely available, there are a number of products to choose from in order to meet your special needs. The main thing is to use them. 3. Update desktop antivirus system at any time interestingly, in 1999 we encouraged users to "weekly" Check for antivirus updates. Today, all vendors provide automatic signature updates. As long as you are connected to the Internet, they can be downloaded to your machine within hours of the discovery of a new security threat. But the basic truth is the same: good security requires you to have anti-virus features on every desktop and keep it updated. Although building antivirus mechanisms in a gateway to a network solves some of the problems, you can only treat a gateway antivirus as an additional line of defense across the antivirus front, not as a substitute for desktop antivirus. 4. Hardening Your Server "hardening" (hardening) involves two simple practice rules: When you buy business software, delete everything you don't need, or disable it if you can't delete it. Typical objects that can be removed by hardening include sample files, demo using wizards, prepaid bundled software, and advanced features that are not intended to be used in the foreseeable future. The more complex the installation, the more likely it is to leave a security risk, so streamline your installation to a level that can no longer be streamlined. In addition, devices and software are typically configured with default username/password access, guest (guest) and anonymous accounts, and default sharing. Remove what you don't need and modify all bodyDefault values for the authentication credentials (because they are known to the hacker because they have lists like this). This practice is more important than it was 5 years ago in this age of massive "bloatware". 5. Patch strategy Essential 2001, when the "Code Red" emerged, it attacked a vulnerability that Microsoft had provided free patches 9 months ago for users to patch. However, the worm continues to spread quickly and on a large scale because the administrators did not download and install the patch. Today, a lot of time has elapsed since a new vulnerability was discovered and the advent of new mass-attack tools. IT administrators need to respond quickly when a vendor releases a security patch. Patch management is currently one of the hottest it topics, but as with many things, the 80/20 rule still applies here. Without a business evaluation tool and a larger budget, a small test network can be built with "too slow" machines that have been eliminated. As a result, a 80% useful test environment can be obtained by using enterprise-level tools to build a 20% of the effort required for a professional lab. Microsoft,apple and many other organizations basically provide a security patch every month. Accessing and installing those patches should be part of your job content and planning tasks. Don't take action afterwards. The responsible editor Zhao Zhaoyi#51cto.com TEL: (010) 68476636-8001 give force (0 votes) to be tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 votes) to the original: five means to ensure that your network security back to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.