Are you safe from malicious attacks? Why Security should be your 2019 focus

01 April 2019

Published by Abhishek Purohit, Network Security Engineer at Kytec

With 6+ years’ experience in Cisco technologies, CCIE Security and PCNSE.

IT Security is the state of being free from danger or threat. The security industry has come a long way defending the systems and corporations since Creeper, Elk Cloner and Brain (first industry viruses in the wild) but even in today's age with the Next-Gen Security systems, a new threat finds a way to breach it and with that, the game of cat and mouse begins.

What is an ideal security system? This is a very open and relative question. InfoSec can mean anything to the business depending on their assets and business policies. For an MSP/IT consultancy firm, security could mean having safe password policies, secure access to their customer accounts whereas for an e-commerce business, PCI compliance and data leaks and prevention could be a priority. It all drills down to the money, effective implementation of security policies as no network is 100% secure. Period.

At Kytec, we always aim to provide the ideal security solutions that can benefit the business and provide the feeling of being secure to the infrastructure team. Our methodology is very straight forward. Assess, Respond, Deploy and Support.

Assess -> This phase includes working closely with the business and IT teams and understanding their pain points, then observing their structure and policy framework.

Respond -> This is the phase where we provide recommendations for the improved solution.

Deploy -> This is deploying the solution advised and approved.

Support -> IT support after successful deployment, it is our duty to make sure that the in-house IT team is fluent in the new systems and help them be comfortable with the new solution, while also helping them if and when in future, there are any industry recommendations and advises.

In our opinion, there are 4 entry points in a secure system to be counted as breach points. Internet (WWW), Emails, Unauthorized access to the network (unsecured ports or unsecured wireless) and the most important, the end-user.

Understanding the importance and process of securing a business should begin by asking "WHAT" and "HOW" for the assets, systems and policies, and educating the end users to do the right thing. Having MFA for access, SPF,DKIM and DMARC for emails, DNS based security approach and SSL decryption capacity to monitor and prevent browser traffic based attacks, implementing group policies, and drive encryption mechanism for end users and limiting the installation of non-compliant software and always patching and updating the systems, having the right identity and access management policies, securing remote access using better encryption mechanism, all collectively are the key to a secure infrastructure. Yet, no matter how many systems you put in, the end user component will always be a threat vector, irrespective of the scale or policies, though it is imperative to have a proactive approach towards security instead of a reactive one.

Keep calm and stay secure.

To learn more about our Security solutions, check out our products page or get into contact with one of our specialists today.