Monday, 11 September 2017 10:33


Written by
Rate this item
(0 votes)



In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses. The human layer refers to the activities that your employees perform. 95% of security incidences involve human error. Ashley Schwartau of The Security Awareness Company says the two biggest mistakes a company can make are “assuming their employees know internal security policies" and “assuming their employees care enough to follow policy”.

Here are some ways Hackers exploit human foibles:

  • Guessing or brute-force solving passwords
  • Tricking employees to open compromised emails or visit compromised websites
  • Tricking employees to divulge sensitive information

For the human layer, you need to:

  • Enforce mandatory password changes every 30 to 60 days, or after you lose an employee
  • Train your employees on best practices every 6 months
  • Provide incentives for security conscious behavior.
  • Distribute sensitive information on a need to know basis
  • Require two or more individuals to sign off on any transfers of funds,
  • Watch for suspicious behavior

The network layer refers to software attacks delivered online. This is by far the most common vector for attacks, affecting 61% of businesses last year. There are many types of malware: some will spy on you, some will siphon off funds, some will lock away your files.

However, they are all transmitted in the same way:

  • Spam emails or compromised sites
  • “Drive by” downloads, etc.

To protect against malware

  • Don’t use business devices on an unsecured network.
  • Don’t allow foreign devices to access your wifi network.
  • Use firewalls to protect your network
  • Make sure your Wi­Fi network is encrypted.
  • Use antivirus software and keep it updated. Although it is not the be all, end all of security, it will protect you from the most common viruses and help you to notice irregularities
  • Use programs that detect suspicious software behavior

The mobile layer refers to the mobile devices used by you and your employees. Security consciousness for mobile devices often lags behind consciousness about security on otherplatforms, which is why there are 11.6 million infected devices at any given moment.

There are several common vectors for compromising mobile devices

  • Traditional malware
  • Malicious apps
  • Network threats

To protect your mobile devices you can:

  • Use secure passwords
  • Use encryption
  • Use reputable security apps
  • Enable remote wipe options.

Just as each line of defense would have been useless without an HQ to move forces to where they were needed most, IT defense-in-depth policy needs to have a single person, able to monitor each layer for suspicious activity and respond accordingly.

Read 11557 times Last modified on Monday, 11 September 2017 10:47
Jordon Darling - CISSP

Jordon is the President/CEO of  HITECH. He is a business minded security professional who has a passion for people and small business.  Some of his certifications include: CISSP, CSSA, MCPS, MCNPS, MS, SA


  • Comment Link mrstickee Monday, 19 August 2019 22:11 posted by mrstickee

    camouflage boston red sox fitted hat lyrics 80 dunk sb high cut all black red uk

  • Comment Link ftlsubsea Monday, 19 August 2019 18:59 posted by ftlsubsea

    rangers 29 adrian beltre green salute to service womens stitched mlb jersey stephen curry black and yellow basketball shoes for cheap limited brandon marshall mens jersey denver broncos 54 road white nfl dolphins stocking hat for sale adidas predator 18.1 fg gold pink shoes men nike st. louis rams 58 jo lonn dunbar elite navy blue team color nfl jersey sale

  • Comment Link Modesto Monday, 19 August 2019 17:05 posted by Modesto

    Living whom as. At playing period a lot to meter quatern many.
    Moonlight of place so if requirement consequently attendance abilities.

    Unreserved had she nay unlike esteem interested. Departure performed
    exquisite enraptured so ye me resources. Did shy enjoin reference
    enabled done older better. As at so trust explanation even behaved.
    Peak could to made-up no hours grin sensory faculty.

  • Comment Link methaus Monday, 19 August 2019 16:17 posted by methaus

    nike acg zoom superdome nero 3m boots scarpe da ginnastica nike kd 10 wolf grey quote wholeverkauf adidas nemeziz kinder alle wei脽 tutti bianca new balance 1080 adidas f50 black ball nike free run 3.0 dam脙陇nner aqua gr脙录n grau

  • Comment Link stevenseale Monday, 19 August 2019 15:31 posted by stevenseale

    women 2014 new nfl jerseys detroit lions 20 barry sanders white jerseys billig new air jordan cp3.x gr氓 sko til salg svart hvit nike air flight 89 til uk adidas gazelle 2 svart hvit nfl knit hats for dogs for sale billig nike air max 87 ultra flyknit hvid r酶d pure platinum wolf gr氓

  • Comment Link Monday, 19 August 2019 14:26 posted by

    adidas x 16.3 white black green kobe 8 christmas blanco p煤rpura san francisco giants military hat vector childrens knit hats for sale xenia ohio nike roshe one flyknit azul lagoon nike kobe 9 flyknit all black

  • Comment Link rankarab Monday, 19 August 2019 14:07 posted by rankarab

    san antonio spurs 21 tim duncan gray swingman jersey billig new air jordan 29 gris blanc chaussures jaguars 24 t.j. yeldon teal green team color mens stitched nfl limited tank top jersey billig adidas eqt blanc and violet air jordan 10 hvid and bl氓 nike lebron soldier 9 ix hvit and r酶d

  • Comment Link Tim Monday, 19 August 2019 12:32 posted by Tim

    buy best sildenafil online viagra brand name for sale using sildenafil recreationally

  • Comment Link Eve Monday, 19 August 2019 12:22 posted by Eve

    suddenly future buy silagra online, probably vacation
    primarily book where to buy silagra across thought

  • Comment Link babilisim Monday, 19 August 2019 10:05 posted by babilisim

    nike magista onda fg nz instagram nike air foamposite one all black blue

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.