Published by Abhishek Purohit, Network Security Engineer at Kytec

With 6+ years’ experience in Cisco technologies, CCIE Security and PCNSE.

IT Security is the state of being free from danger or threat. The security industry has come a long way defending the systems and corporations since Creeper, Elk Cloner and Brain
(first industry viruses in the wild) but even in today’s age with the Next-Gen Security systems, a new threat finds
a way to breach it and with that, the game of cat and mouse begins.

What is an ideal security system? This is a very open and relative question. InfoSec can mean anything to the
business depending on their assets and business policies. For an MSP/IT consultancy firm, security could mean having
safe password policies, secure access to their customer accounts whereas for an e-commerce business, PCI compliance
and data leaks and prevention could be a priority. It all drills down to the money, effective implementation of
security policies as no network is 100% secure. Period.

At Kytec, we always aim to provide the ideal security solutions that can
benefit the business and provide the feeling of being secure to the infrastructure team. Our methodology is very
straight forward. Assess, Respond, Deploy and Support.

Assess -> This phase includes working closely with the business and IT teams and understanding their pain points,
then observing their structure and policy framework.

Respond -> This is the phase where we provide recommendations for the improved solution.

Deploy -> This is deploying the solution advised and approved.

Support -> IT support after successful deployment, it
is our duty to make sure that the in-house IT team is fluent in the new systems and help them be comfortable with
the new solution, while also helping them if and when in future, there are any industry recommendations and advises.

In our opinion, there are 4 entry points in a secure system to be counted as breach points. Internet (WWW), Emails,
Unauthorized access to the network (unsecured ports or unsecured wireless) and the most important, the end-user.

Understanding the importance and process of securing a business should begin by asking “WHAT” and “HOW” for the
assets, systems and policies, and educating the end users to do the right thing. Having MFA for access, SPF,DKIM and
DMARC for emails, DNS based security approach and SSL decryption capacity to monitor and prevent browser traffic
based attacks, implementing group policies, and drive encryption mechanism for end users and limiting the
installation of non-compliant software and always patching and updating the systems, having the right identity and
access management policies, securing remote access using better encryption mechanism, safe collaboration in the workplace, all collectively are the key to a
secure infrastructure. Yet, no matter how many systems you put in, the end user component will always be a threat
vector, irrespective of the scale or policies, though it is imperative to have a proactive approach towards security
instead of a reactive one.

Keep calm and stay secure.

To learn more about our Security solutions, check out our products
page
 or get into contact with one of our
specialists today.

View next post: newerPREVIOUS
NEXTView next post: older