Skip to content

5 Ways to Secure a Network

Posted by John Pohlman in Blog, IT Security, on

Tanner’s Information Security practice analyzed the security breaches from 2022 and compiled a list of the most effective ways to mitigate threats presented by cyber-attacks.  This will not completely mitigate all threats, but it is an excellent starting point to increasing network security. The individual who oversees your Information Technology should be able to make these modifications to your system.

Disable Unused Services

Uninstall any unused software and disable unnecessary network services.  Every service and program that runs on a server is another potential gateway for a cybercriminal to break into the system.  Some programs and services are inherently less secure than others, and their presence on a system creates unnecessary risk when they are not being used.

Run Updates and Patches on all Systems

Ensure that all systems have the most current updates and patches applied.  Hackers prey on outdated and vulnerable software.  Software vendors are frequently releasing security updates for their products, and if a system falls behind in its updates, an attacker can easily take advantage of the system.

Configure Firewall Properly

Enable the host firewall and security services that come with the operating system.  In addition to this, make sure that the firewall is configured appropriately.  It would be a false sense of security to believe that a firewall automatically knows which traffic to allow and which traffic to accept; the firewall must be configured to control which traffic reaches the server.

Use Complicated Passwords

Make passwords hard to guess and make sure they are guarded safely.  A secure password will have at least 8 characters and will have a mix of lowercase and uppercase letters as well as numbers or special characters.  It is important to not use password trends such as names of loved ones or birthdates, as they are much easier to guess.  Try to pick something abstract and never tell anyone your password.  Change the password if you ever believe it may have been compromised.

Perform Ongoing Security Tests

Even after security precautions have been implemented, it is important to test the network on a routine schedule.  A Network Vulnerability Assessment helps identify technical vulnerabilities from the perspective of a hacker.  Some of these vulnerabilities might originate from problems such as outdated software, insecure host settings and improper guest/anonymous system access.

Contact Us

If you have questions about the information outlined above or need assistance with a net pen testing, Tanner Co can help. For additional information click here to contact us. We look forward to speaking with you soon.

Schedule a Call


Insights

Transfer Pricing in 2026: From Compliance to Audit Readiness

Key Takeways Transfer pricing has evolved from a routine “check-the-box” exercise into a high-stakes strategic priority, where global tax authorities…

Short-Term vs. Long-Term Rentals: Which Strategy Maximizes Your Tax Benefits?

The rise of platforms like Airbnb and VRBO has fundamentally changed how people approach real estate investing. What used to…

Influence
Podcast

Interviews and conversations with some of the leading entrepreneurs, founders, and luminaries in the industry.

Impact
Podcast

Experiences of not-for-profit organizations that are having a significant impact in our communities.