Voted Best Network Integrator in Arizona
Voted Best Network Integrator in Arizona
(623) 688-TECH (8324)

High-speed Internet changed everything

31.07.16 03:55 PM By azdatacom

Back in my day, a good antivirus (AV) product was all you needed to protect a network. Patches were mostly bug fixes, and the Internet was relatively safe.


High-speed Internet changed everything. Back in the days of dial up, the bandwidth did not exist to provide a cybercriminal with decent access to your network. The connection wasn't 24/7 either. Users connected to the Internet, did what was needed, and logged off so someone could use the phone line to make a call.


Ah, the good old days...


Fast forward 20 years or so.


Like Bob Seger sang:Twenty yearsWhere'd they go?Twenty yearsI don't know


Sigh, where did they go?


Anyway, the point is, today almost every computer connects to high-speed Internet, 24/7. This change alone paved the way for cybercriminals to have access to unprotected machines all over the world.


AV simply is not enough anymore, and it is a reactive defense rather than a proactive one. AV protects you only after you've been infected.


Cybercriminals tend to target operating system and third-party software vulnerabilities. This means that patch management has gone from an optional method of keeping up with the latest fixes, to a necessary (and more often legally required) proactive security measure.


Simply put, if you have a network, you have to patch. This has become a full-time job.


The next issue is that not all the sites out there are friendly. Cybercriminals know that users will be drawn to anything that is free. Many of these sites are designed to lure unsuspecting users into a place where their machines can be compromised for data or even taken over as in the case of a botnet. While the user feels they are lucking out watching "Game of Thrones" for free, behind the scenes there very well could be compromising software installed, waiting to be fired up and used at the right time.


Today, a layered security approach is essential. What does that look like?


First Layer: Web Filtering


This will help prevent users from going to compromised or fraud sites. Now, you may have an appliance that does this, and that is great. However, keep in mind that one infected remote user can unknowingly smuggle in something that can infect your whole network. You must be able to apply the same filtering to everyone.


Second Layer: Patch Management


All the security software in the world won't help you if an attacker is able to take control of your OS or browser based on a vulnerability. Patching is absolutely essential.


Third Layer: Antivirus


What was once the first and only layer has now become the reactive security layer. This defense kicks in if a criminal has managed to get past the first two.


Conclusion


Cybercriminals today have the world at their doorstep. They are looking for quick and easy access. Covering the three layers mentioned here makes you far less attractive to them. There are too many networks out there that are not taking this approach.


Don't be the low hanging fruit, keep your users and your business protected.


Author: David Ianetta