Enterprise Security Risks Caused by private computer connection to the Internet

Source: Internet
Author: User

Apart from firewalls, anti-virus, IPS/IDS, is there anything else to do with security? At least a lot of foreign enterprise network administrators have begun to pay attention to what needs to be done in the face of the proliferation of more and more private devices in the enterprise network.

Where does the risk come from?

Recently, during the annual meeting of the U.S. Small Enterprises Alliance, some small non-profit organizations found that more and more small and medium enterprises are using DSL to connect to the Internet. Many employees of the company use WiFi without permission and use a private notebook to connect to the Internet through the enterprise network.

Obviously, for an experienced Network Administrator, this approach is unacceptable in terms of security. Unfortunately, most employees in the IT department of small and medium-sized enterprises are temporary workers or outsourced to other companies, so these network administrators did not reject similar behavior. It should also be pointed out that this situation is universal.

It is definitely not a small task to connect a private device to a CEN, especially to the Internet. You need to know that many private computers are not well protected. Viruses, Trojans, spyware, and even direct attack packets are likely to threaten the security of enterprise networks through these insecure devices.

What should enterprises do?

In addition to network management, most small and medium-sized enterprises need to pay attention to the board of directors. In fact, there are many things they need to pay attention to in terms of security. Because there are many problems that need to be clarified beforehand: the most important thing is that the management should consider formulating a policy at the right time. The core content must include only computers distributed by the company, or the company's internal computer can be used in the network.

Such a policy can achieve many things. Good security policies can help enterprises minimize the possibility of virus infection of spyware and computers. You need to know that the protection levels of these computers may be different.

Coincidentally, the North American IT industry recently reported many security issues. Some authors point out that employees connect to the Internet through private computers, this greatly increases the likelihood that sensitive enterprise information may leave the company's location and die in the hands of an individual. In fact, these people may not need to access this information at all. At present, some private laptops are also stolen, which further increases the security risks to the company.

In addition, the issue of enterprise IT assets authorization (License) also needs to be concerned. Some experts have said that no matter what type of servers an enterprise has, it must ensure that the computer is not owned by networks other than the Enterprise. Otherwise, the consistency of server resource authorization will be weakened.

The security approach is that enterprise network management relies on various firewalls of enterprises to connect enterprise networks to the Internet. IT is important for IT outsourcing enterprises to find out which firewalls are used, you must know that most of the firewalls used by SMEs are authorized to process a certain number of users.

In addition, if an enterprise has two or more systems running on the network, the firewall may cause some users to be unable to access the Internet due to some authorization problems, this problem occurs mostly in the sporadic aspects of basic security control.

Use End encryption

In addition, many small and medium-sized enterprises have set up a wireless access point AP in the enterprise network. During AP authorization control, most enterprises adopt the SSID or administrator password configuration method.

Some security experts have said that security controls based on these two points should be changed because these two security controls may not run any type of encryption, and those private computers will also expose enterprise information, at present, some intruders can use these two control methods to determine the company name or even the company's computer access purpose.

However, for some enterprise users, wireless network cabling and applications are indeed cheaper and easier to install than traditional wired networks. However, this does not reduce the security concerns of enterprises. At present, some security vendors have developed dedicated wireless network encryption generators, using AES Algorithms supported by hardware and stronger encryption keys. Without such equipment, the current wireless network may also leave hidden risks for hackers or thieves.

These problems are the most common problems in daily enterprise operation. For the majority of small and medium-sized enterprises, some of the basic steps should be adopted, IT managers should also help the company to reduce the risk of threats. You need to know that these policies are not temporary steps. network administrators can traverse a periodic process to ensure that everything is secure and can be upgraded as needed.

Another experience worth promoting is that if an enterprise finds that an employee understands how to deploy the above scheme, the enterprise should reuse this person to achieve faster and more thorough security deployment, you need to know that this is more important for SMEs.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.