A Six Step Network Security Assessment for A Secure 2018

09.11.2018 07:11

These statistics aren’t necessarily shocking, but they do speak to the need for a security assessment.

A network security assessment will help you determine the steps you need to take to prepare yourself, your organization, and your network for the threats of today and tomorrow. Here are a few ideas to get you started:

  1. Assess the vulnerabilities of networks, applications, other IT resources. Document and analyze your entire IT infrastructure to find the weaknesses and potential issues.
  2. Conduct comprehensive scanning of ports, vectors, protocols.Conduct a comprehensive scan of all ports on your network to identify the IT equivalent of open windows and unlocked doors. The most common malicious network scans search for vulnerabilities in a standard range of 300 ports on a network where the most common vulnerabilities are found. However, you may have over 60,000 ports on your network that can be suspect.
  3. Understand how your network interacts with outside parties. Try to access your network as an outside party might. See what your network requests in terms of information and how easily it can be satisfied.
  4. Probe your internal network weaknesses. Assess interaction with internal networks. Unfortunately, you can’t assume that all threats will originate outside your network. Internal people can pose a threat too.
  5. Review wireless nets, including Wi-Fi, Bluetooth, RFID, rogue devices. Wireless nets, rogue devices, and removable media all present vulnerabilities. If a hacker leaves a USB flash drive containing malicious code in your lobby, someone will likely pick it up and pop it into a system on the network to see what’s on it. That’s all it takes to compromise your network.
  6. Assess and educate employees about social engineering attacks. This includes policies around behavior such as using social media or picking up flash drives left lying around.

Related services to this article.