Skip to content

5 Ways to Secure a Network

Tanner’s Information Security practice analyzed the security breaches from 2022 and compiled a list of the most effective ways to mitigate threats presented by cyber-attacks.  This will not completely mitigate all threats, but it is an excellent starting point to increasing network security. The individual who oversees your Information Technology should be able to make these modifications to your system.

Disable Unused Services

Uninstall any unused software and disable unnecessary network services.  Every service and program that runs on a server is another potential gateway for a cybercriminal to break into the system.  Some programs and services are inherently less secure than others, and their presence on a system creates unnecessary risk when they are not being used.

Run Updates and Patches on all Systems

Ensure that all systems have the most current updates and patches applied.  Hackers prey on outdated and vulnerable software.  Software vendors are frequently releasing security updates for their products, and if a system falls behind in its updates, an attacker can easily take advantage of the system.

Configure Firewall Properly

Enable the host firewall and security services that come with the operating system.  In addition to this, make sure that the firewall is configured appropriately.  It would be a false sense of security to believe that a firewall automatically knows which traffic to allow and which traffic to accept; the firewall must be configured to control which traffic reaches the server.

Use Complicated Passwords

Make passwords hard to guess and make sure they are guarded safely.  A secure password will have at least 8 characters and will have a mix of lowercase and uppercase letters as well as numbers or special characters.  It is important to not use password trends such as names of loved ones or birthdates, as they are much easier to guess.  Try to pick something abstract and never tell anyone your password.  Change the password if you ever believe it may have been compromised.

Perform Ongoing Security Tests

Even after security precautions have been implemented, it is important to test the network on a routine schedule.  A Network Vulnerability Assessment helps identify technical vulnerabilities from the perspective of a hacker.  Some of these vulnerabilities might originate from problems such as outdated software, insecure host settings and improper guest/anonymous system access.

Contact Us

If you have questions about the information outlined above or need assistance with a net pen testing, Tanner Co can help. For additional information click here to contact us. We look forward to speaking with you soon.

Schedule a Call

Please provide a valid first name (at least 2 characters).
Please provide a valid last name (at least 2 characters).
Please provide a company name.
Please provide a valid email address.
Please provide a valid phone number (at least 10 digits).

Insights

U.S. Withholding Tax in 2026: What International Businesses Need to Know Before Making Payments

Cross-border business is no longer rare. It is simply how modern organizations operate. That also means Cross-border business is no…

IRS Extends Feedback Period for Form 6765: What Taxpayers Need to Know About Section G

The IRS has announced an important update for businesses claiming the Credit for Increasing Research Activities—commonly known as the research…

Influence
Podcast

Interviews and conversations with some of the leading entrepreneurs, founders, and luminaries in the industry.

Impact
Podcast

Experiences of not-for-profit organizations that are having a significant impact in our communities.