Skip to content

5 Ways to Secure a Network

Tanner’s Information Security practice analyzed the security breaches from 2022 and compiled a list of the most effective ways to mitigate threats presented by cyber-attacks.  This will not completely mitigate all threats, but it is an excellent starting point to increasing network security. The individual who oversees your Information Technology should be able to make these modifications to your system.

Disable Unused Services

Uninstall any unused software and disable unnecessary network services.  Every service and program that runs on a server is another potential gateway for a cybercriminal to break into the system.  Some programs and services are inherently less secure than others, and their presence on a system creates unnecessary risk when they are not being used.

Run Updates and Patches on all Systems

Ensure that all systems have the most current updates and patches applied.  Hackers prey on outdated and vulnerable software.  Software vendors are frequently releasing security updates for their products, and if a system falls behind in its updates, an attacker can easily take advantage of the system.

Configure Firewall Properly

Enable the host firewall and security services that come with the operating system.  In addition to this, make sure that the firewall is configured appropriately.  It would be a false sense of security to believe that a firewall automatically knows which traffic to allow and which traffic to accept; the firewall must be configured to control which traffic reaches the server.

Use Complicated Passwords

Make passwords hard to guess and make sure they are guarded safely.  A secure password will have at least 8 characters and will have a mix of lowercase and uppercase letters as well as numbers or special characters.  It is important to not use password trends such as names of loved ones or birthdates, as they are much easier to guess.  Try to pick something abstract and never tell anyone your password.  Change the password if you ever believe it may have been compromised.

Perform Ongoing Security Tests

Even after security precautions have been implemented, it is important to test the network on a routine schedule.  A Network Vulnerability Assessment helps identify technical vulnerabilities from the perspective of a hacker.  Some of these vulnerabilities might originate from problems such as outdated software, insecure host settings and improper guest/anonymous system access.

Contact Us

If you have questions about the information outlined above or need assistance with a net pen testing, Tanner Co can help. For additional information click here to contact us. We look forward to speaking with you soon.

Schedule a Call

Please provide a valid first name (at least 2 characters).
Please provide a valid last name (at least 2 characters).
Please provide a valid email address.
Please provide a valid phone number (at least 10 digits).

Insights

The Return of R&D Expensing – What It Means for Your Business

For many companies, R&D is the lifeblood of business growth. Yet for years, the way businesses could recover their R&D…

When a Partnership Grows Up: Inside a C Corporation Conversion and What It Really Takes

When a Partnership Grows Up: Inside a C Corporation Conversion and What It Really Takes

Entity choice is rarely static. What works well in the early and middle stages of growth can become a constraint…

Influence
Podcast

Interviews and conversations with some of the leading entrepreneurs, founders, and luminaries in the industry.

Impact
Podcast

Experiences of not-for-profit organizations that are having a significant impact in our communities.