Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

A complete guide to network security

5/02/2014 by

W1siziisijiwmtqvmtavmjgvmtuvntevndkvntqyl2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0


Information security professionals are fond of pointing out that networks are only as secure as their weakest point. The most pressing issue for organisations today, though, is that the increasing complexity of our networks means there are many more weak points for hackers to exploit.

Since we’re all increasingly reliant on digital technology, there’s a lot more valuable information out there in the electronic ether that’s ripe for the picking. This has led to a vast increase in both the volume and sophistication of attacks.

As a result, it’s becoming increasingly difficult for organisations to find and plug all the holes before they fall foul of a potentially damaging breach. Without a sound security strategy and the continual use of automated tools to monitor networks for vulnerabilities and orchestrate their security policies, many network managers are forever chasing their own tails, reacting to events as they occur.

THE CHALLENGES OF NEW TECHNOLOGIES

Trends such as BYOD (‘bring your own device’)cloud computing and social networking present untold challenges for network security managers, and require that organisations take a fundamentally different and more rigorous approach than might have been appropriate a decade ago. Back then, the threats were comparatively minimal – a few nasty worms and viruses that you could, by and large, deal with by firewalling the perimeter of your organisation and running up-to-date antivirus software, and ‘man in the middle’ attacks which you could prevent by using encryption and VPNs.

Today, employees use myriad devices, operating systems and browsers to access their applications and data. There are iOS, Android, Windows and BlackBerry smartphones and tablets; Apple, Windows and Linux laptops and desktops, plus at least 10 different types of web browser. Not only that, but all of these operating systems and browsers have multiple flavours and versions, all of which present different security vulnerabilities. And since many devices are owned by employees, they often sit completely outside corporate control.

If a single device, file or online account becomes compromised or infected, employees might subsequently infect systems inside the corporate firewall. A hacker with criminal intent doesn’t even have to be particularly tech-savvy. Anyone can download easy-to-use attack tools that exploit known security holes, and there are even underground web marketplaces where attackers can buy unpublished (so-called ‘zero day’) vulnerabilities.

This article has been extracted from http://www.itproportal.com/, please click on this link to read the article in full  http://www.itproportal.com/2014/02/05/complete-guide-network-security/#ixzz2sRkXmD9v

Montash is a multi-award winning , global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

For more information please contact us on +44 (0) 20 7014 0230 or alternatively send us an email on info@montash.com.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmduvmjmvmtmvmjavmjkvndg3l3nodxr0zxjzdg9ja180mtqwnti1mdeuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

Their Shoes... Matthew Gilbranch, Managing C...

2017-05-23 15:00:00 +0100

Matthew Gilbranch (32) is a managing consultant here at Montash, managing the SAP team. With 7 years in the global recruitment industry, he loves helping people and building lasting relationships with clients and candidates alike. He took the time to talk to us about what a typical day is like in the global IT recruitment industry. "I get up at 6 and I'm out of the house by half 6 and on the train by twenty to 7. On the train I tend to have a power nap ...

W1siziisijiwmtcvmduvmdqvmtyvndavmzkvotg5l3nodxr0zxjzdg9ja181ndm0mduxmtuuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

7 Things About Your CV You Need To Fix Right ...

2017-05-04 18:00:00 +0100

As a global technology recruitment agency, we are in touch with candidates day in and day out. We've seen all kinds of CVs in our time and know a good one when we see it. As our recruitment team look to find the ideal candidate, they are looking for CVs that show how candidates can impact their clients in a positive way, not just look flashy on paper. You only have a small amount of space on your CV to show off your skills, so make every word count. Cut...