Thursday, 24 August 2017 17:31

IT Defense In Depth Part 1

Written by
Rate this item
(1 Vote)

In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack. The problem is, you can’t map every possible avenue for attack.

What does this have to do with IT security? Today many business owners install an antivirus program as their Maginot Line and call it a day. However there are many ways to get into a network that circumvent antivirus software.

Hackers are creating viruses faster than antivirus programs can recognise them (about 100,000 new virus types are released daily), and professional cybercriminals will often test their creations against all commercially available platforms before releasing them onto the net.

Even if you had a perfect anti­virus program that could detect and stop every single threat, there are many attacks that circumvent anti­virus programs entirely. For example, if a hacker can get an employee to click on a compromised email or website, or “brute force guess” a weak password, all the antivirus software in the world won’t help you.

There are several vulnerabilities a hacker can target: the physical layer, the human layer, the network layer, and the mobile layer. You need a defense plan that will allow you to quickly notice and respond to breaches at each level.

The physical layer refers to the computers and devices that you have in your office. This is the easiest layer to defend, but is exploited surprisingly often.

Here are a few examples:

  • Last year 60% of California businesses reported a stolen smartphone and 43% reported losing a tablet with sensitive information.
  • The breaches perpetrated by Chelsea Manning and Edward Snowden occurred because they were able to access devices with sensitive information.
  • For example, Comptia left 200 USB devices in front of various public spaces across the country to see if people would pick a strange device and insert into their work or personal computers. 17% fell for it.

For the physical layer, you need to:

  • Keep all computers and devices under the supervision of an employee or locked away at all times.
  • Only let authorized employees use your devices
  • Do not plug in any unknown USB devices.
  • Destroy obsolete hard drives before throwing them out

Next time in Part II, we will talk about the human and network layers of security.

Read 3658 times Last modified on Thursday, 24 August 2017 17:46
Jordon Darling - CISSP

Jordon is the President/CEO of  HITECH. He is a business minded security professional who has a passion for people and small business.  Some of his certifications include: CISSP, CSSA, MCPS, MCNPS, MS, SA

195 comments

  • Comment Link Latanya Monday, 17 December 2018 03:34 posted by Latanya

    Magnificent goods from you, man. I have have
    in mind your stuff previous to and you're just extremely wonderful.

    I really like what you've acquired here, really like what
    you're stating and the best way during which yoou assert it.
    You're making it entertaining and you still take
    care of to stay it sensible. I can't wait to learn much mor from you.
    This is really a wonderful website.

  • Comment Link taruhan bola Sunday, 16 December 2018 20:31 posted by taruhan bola

    Amazing blog! Do you have any suggestions for aspiring writers? I'm planning to start my own blog soon but I'm a little lost on everything. Would you suggest starting with a free platform like Wordpress or go for a paid option? There are so many choices out there that I'm totally overwhelmed .. Any tips? Kudos!

  • Comment Link poker online Sunday, 16 December 2018 13:21 posted by poker online

    Awesome blog! Do you have any helpful hints for aspiring writers? I'm hoping to start my own website soon but I'm a little lost on everything. Would you recommend starting with a free platform like Wordpress or go for a paid option? There are so many options out there that I'm completely confused .. Any tips? Bless you!

  • Comment Link bandar judi Sunday, 16 December 2018 04:17 posted by bandar judi

    Awesome blog! Do you have any tips for aspiring writers? I'm hoping to start my own website soon but I'm a little lost on everything. Would you recommend starting with a free platform like Wordpress or go for a paid option? There are so many choices out there that I'm completely overwhelmed .. Any recommendations? Bless you!

  • Comment Link escort bayanlar izmir Saturday, 08 December 2018 13:45 posted by escort bayanlar izmir

    I cannot thank you enough for the blog post.Really looking forward to read more. Awesome.

  • Comment Link Consuelo Thursday, 06 December 2018 09:50 posted by Consuelo

    I wanted to thank you for this great read!! I absolutely loved every little bit of it.
    I've got you bookmarked to check out new stuff you post…

  • Comment Link Johnie Thursday, 06 December 2018 09:19 posted by Johnie

    Hurrah, that's what I was exploring for, what a material!

    existing here at this blog, thanks admin of this web page.

  • Comment Link Alda Wednesday, 05 December 2018 21:09 posted by Alda

    Hi friends, how is everything, and what you would like to say about this
    piece of writing, in my view its truly remarkable in favor of me.

  • Comment Link Autumn Wednesday, 05 December 2018 04:26 posted by Autumn

    Somebody essentially lend a hand to make significantly posts I might state.
    This is the first time I frequented your web page and so far?
    I amazed with the research you made to make this particular put up incredible.
    Excellent task!

  • Comment Link Concepto De Optimismo Monday, 03 December 2018 11:55 posted by Concepto De Optimismo

    Whats up! I just want to give a huge thumbs up for the good information you've got right here on this post. I will likely be coming again to your weblog for extra soon.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.