Monday, 11 September 2017 10:33


Written by
Rate this item
(0 votes)



In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses. The human layer refers to the activities that your employees perform. 95% of security incidences involve human error. Ashley Schwartau of The Security Awareness Company says the two biggest mistakes a company can make are “assuming their employees know internal security policies" and “assuming their employees care enough to follow policy”.

Here are some ways Hackers exploit human foibles:

  • Guessing or brute-force solving passwords
  • Tricking employees to open compromised emails or visit compromised websites
  • Tricking employees to divulge sensitive information

For the human layer, you need to:

  • Enforce mandatory password changes every 30 to 60 days, or after you lose an employee
  • Train your employees on best practices every 6 months
  • Provide incentives for security conscious behavior.
  • Distribute sensitive information on a need to know basis
  • Require two or more individuals to sign off on any transfers of funds,
  • Watch for suspicious behavior

The network layer refers to software attacks delivered online. This is by far the most common vector for attacks, affecting 61% of businesses last year. There are many types of malware: some will spy on you, some will siphon off funds, some will lock away your files.

However, they are all transmitted in the same way:

  • Spam emails or compromised sites
  • “Drive by” downloads, etc.

To protect against malware

  • Don’t use business devices on an unsecured network.
  • Don’t allow foreign devices to access your wifi network.
  • Use firewalls to protect your network
  • Make sure your Wi­Fi network is encrypted.
  • Use antivirus software and keep it updated. Although it is not the be all, end all of security, it will protect you from the most common viruses and help you to notice irregularities
  • Use programs that detect suspicious software behavior

The mobile layer refers to the mobile devices used by you and your employees. Security consciousness for mobile devices often lags behind consciousness about security on otherplatforms, which is why there are 11.6 million infected devices at any given moment.

There are several common vectors for compromising mobile devices

  • Traditional malware
  • Malicious apps
  • Network threats

To protect your mobile devices you can:

  • Use secure passwords
  • Use encryption
  • Use reputable security apps
  • Enable remote wipe options.

Just as each line of defense would have been useless without an HQ to move forces to where they were needed most, IT defense-in-depth policy needs to have a single person, able to monitor each layer for suspicious activity and respond accordingly.

Read 20990 times Last modified on Monday, 11 September 2017 10:47
Jordon Darling - CISSP

Jordon is the President/CEO of  HITECH. He is a business minded security professional who has a passion for people and small business.  Some of his certifications include: CISSP, CSSA, MCPS, MCNPS, MS, SA


  • Comment Link where do i get viagra Friday, 11 October 2019 14:05 posted by where do i get viagra

    extremely mention [url=]when generic
    viagra[/url] easily contract morning shopping forth charity deeply plenty where to buy over the counter viagra yeah manager

  • Comment Link hepmacizle Friday, 11 October 2019 13:38 posted by hepmacizle

    nhl jerseys pittsburgh penguins 66 mario lemieux white 2014 stadium series jerseys billig youth chicago blackhawks 88 patrick kane 2015 stanley cup 2014 stadium series black jersey billig nike lebron black lion for cheap nike hyperdunk 2016 flyknit all grey black uk miami dolphins boonie hat zions bank how to make a baby hat out of yarn scarf

  • Comment Link Geremogonna Friday, 11 October 2019 13:18 posted by Geremogonna

    flight cheapest cialis online buy generic cialis inform

  • Comment Link real viagra for sale online Friday, 11 October 2019 12:47 posted by real viagra for sale online

    foods alternative to sildenafil viagra usa pharmacies online sildenafil over the counter las vegas

  • Comment Link FazidGep Friday, 11 October 2019 11:25 posted by FazidGep

    buy tadalafil citrate viagra online overnight delivery - viagra generico precio
    viagra online pharmacy
    viagra for sale online
    - generic viagra from india
    vente de viagra

  • Comment Link FazidCep Friday, 11 October 2019 11:22 posted by FazidCep

    cheapest viagra, viagra and levitra uk - viagra generic australia
    viagra for daily use side effects you may not post replies
    viagra online without script
    - viagra information viagra vs levitra new posts

  • Comment Link Fazidblete Friday, 11 October 2019 11:10 posted by Fazidblete

    viagra from canada online pharmacy reply #7 on - buy cheap generic viagra online
    how to cure ed
    viagra 100mg for sale
    - viagra 10 mg
    buy generic viagra online

  • Comment Link GeremoLaw Friday, 11 October 2019 08:42 posted by GeremoLaw

    reader cialis and alcohol generic cialis online color

  • Comment Link ZeorgeFoure Friday, 11 October 2019 04:01 posted by ZeorgeFoure

    viagra 20 mg cost delete all board cookies - online sildenafil
    viagra, viagra, genuine generic
    generic cialis viagra
    - side effects viagra
    viagra 5mg daily joined

  • Comment Link Zeorgesurse Friday, 11 October 2019 03:59 posted by Zeorgesurse

    viagra for women dosage forum contains new posts - canadian seldenifil for sale
    viagra 20mg canada password
    cheap viagra online
    - viagra 10 mg effectiveness sort by
    viagra 5 mg coupon occupation

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.