Ten-Minute Guide To Network Security - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

12:25 PM

Ten-Minute Guide To Network Security

Keeping your network secure is a time-consuming job. But it needn't be that tough --- for help, follow our ten-minute guide to get you started on keeping your network safe.

Patch management: "Once you have the process in place to identify vulnerabilities, you then have to ask how you are going to patch them," Hilling says. "Patching can be the most important thing you can do."

As with everything else, this can be an involved process, but Hilling points out that it takes second to decide to implement a patching strategy and another minute to delegate someone to oversee it. "Patching is something that organizations can easily fall behind on," Hilling says. "Someone has to be responsible to see that that doesn't happen."

Get informed: The best way to stay on top of security vulnerabilities, of course, is to make sure you know about them before they bit you in the tender parts. That means taking the time to scan the latest warnings and maybe even reading your favorite networking or security websites over coffee. It doesn't take long to stay informed once you are informed but, as with everything else, you have to take the time to start the process.

"There are a lot of solutions that can bring security intelligence to you," Hilling says. "If you don't have the time to address security yourself, any good managed service provider will deliver intelligence to its customers about what's out there."

Go shopping: Even if security is not strictly a technology issue, you need technology to secure your network. It's probably not a good idea to drop $10,000 on intrusion prevention systems and firewalls in ten minutes -- and the board of directors would have your head if you did -- but it only takes a few minutes to see what what's out there.

Think of it as security window shopping, but take the time to think about what you need and how you will deploy it. "You need to look at security technologies from three levels," Hilling says. "First, what do I need to do to protect the network as a whole, secondly, what do I need to protect my servers. Finally, how will security impact my end users."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
2 of 2
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Becoming a Self-Taught Cybersecurity Pro
Jessica Davis, Senior Editor, Enterprise Apps,  6/9/2021
Ancestry's DevOps Strategy to Control Its CI/CD Pipeline
Joao-Pierre S. Ruth, Senior Writer,  6/4/2021
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
White Papers
Register for InformationWeek Newsletters
2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Flash Poll