Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chalk Talk<br />
Traits to Possess the<br />
Best Enterprise <strong>Security</strong><br />
he founders occasionally forget about<br />
Timplementing important fundamentals of security<br />
and start running after shining technology.<br />
<strong>The</strong> security budgets are limited, so they need to be sure<br />
about covering highest breach areas before moving onto<br />
other things.<br />
IBM reported that more than a billion personal data was<br />
stolen and leaked in 2014 alone, which made it the highest<br />
recorded number in the last 18 years. Cri<strong>min</strong>als are always<br />
a step ahead of the existing security systems. So companies<br />
should have best strategies and practices for enterprise<br />
security.<br />
So how do we ensure to have the best security systems?<br />
It all has to do with having a solid foundation, which starts<br />
with these basic practices.<br />
Strong Firewalls<br />
Firewalls are the first line of defense for any enterprise.<br />
It basically controls the flow of the data and decides the<br />
direction of flow of data. <strong>The</strong> firewall keeps harmful files<br />
from breaching the network and compromising the assets.<br />
<strong>The</strong> traditional process for implementing firewalls is at the<br />
external perimeter of the network, but to include internal<br />
firewalls is the popular strategy. This is one of the best<br />
practices of companies by making it the second line of<br />
defense to keep unwanted and suspicious traffic away.<br />
Securing Router<br />
Routers are mainly used to control the flow of the network<br />
traffic. But routers do have security features too. Modern<br />
routers are full of security features like IDS/IPS<br />
functionality, quality service and traffic management tools<br />
and strong VPN data encryption features. But very few<br />
people use IPS features and firewall functions in their<br />
routers. To have improved security posture companies need<br />
to use all the security features of routers.<br />
Secured Email<br />
It is highly common to receive emails from the suspicious<br />
sources. <strong>The</strong> email is the main target for the cri<strong>min</strong>als. An<br />
14<br />
November 2016