You’re never too small to be attacked !! A Summrized points to raise your CyberSecurity awareness

in #cryptocurrency7 years ago (edited)

CyberSecurity is the technologies, processes and practices designed to protect computers, programs, data and networks (whether private or public networks), including the whole Internet. The field covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction. It includes physical security to prevent theft of equipment and information security to protect the data on that equipment.
cybersecurity-rules-linkedin.png
So what is exactly should be secured when talking about Cyber Security,

I. Physical security

Server room

The server room is the core of your physical network, and anyone with physical access to that room can do enormous damage
Before thinking of locking down the servers, you should ensure that there are good locks on the server room door. Also need policies to organize and supervise who uses this door and who should get the key or access codes, also having some sort of mechanism to close the door automatically when the room is unoccupied.

Vulnerable devices

Servers are NOT what all you have to worry about. A hacker can plug a laptop into a hub and use sniffer software to capture data traveling across the network. Make sure that as many of your network devices as possible are in that locked room, or if they need to be in a different area, in a locked closet elsewhere in the building.
Workstations at unoccupied desks or at locations easily accessible to outsider (such as receptions and front desks) are particularly vulnerable.

Cases: Both servers and workstations should be protected from theft the hard drives. Many computers come with case locks to prevent opening the case without a key.

Portables devices Laptops and handheld computers can be easily stolen, including any data stored on its disk as well as network logon passwords that may be saved.

Drives Disable or remove floppy drives, USB ports, and other ways of connecting external drives. Disconnecting the cables may not stop IT savvy workers. Some organizations go so far as to fill ports with substances to permanently prevent their use

Printers Many of today's printers store document contents in their own on-board memories. if printer is stolen, the thief may be able to make copies of recently printed documents. Printers, like servers and workstations that store important information, should be located in secure locations and bolted down so nobody can walk off with them.

Backups Backup tapes, disks, or discs can be stolen and used by someone outside the company. Backups should be locked in a drawer or safe at the very least. Ideally, a set of backups should be kept off site, and you must take care to ensure that they are secured in that offsite location.

II. Information security

PII (Personally Identifiable Information) and other sensitive information

Make sure you know who has access to folders before you put restricted data there, don’t put sensitive information in locations that are publicly accessible from the Internet. Always transmit restricted data securely. This includes remote access and client/server transmissions and don't use open warless when sending it

Passwords

Password policies should encourage your employees to employ the strongest passwords possible without creating the need or temptation to reuse passwords or write them down. That means passwords that are random, complex and long (at least 10 characters), that are changed regularly, and that are closely guarded by those who know them

Patches and Updates

Make sure all systems that contain or access Restricted Data have all necessary operating system (OS)and third-party application security “patches” and updates.

Network

This includes identifying all devices and connections on the network, setting boundaries between your company’s systems and others, and enforcing controls to ensure that unauthorized access, misuse, or denial-of-service events can be thwarted or rapidly contained and recovered from if they do occur. Networks includes:
1.Internal network
2.Cloud based services

Wireless Network

it is important that such a WLAN be kept separate from the main company network so that traffic from the public network cannot traverse the company’s internal systems at any point. Wireless access control

Remote access

If your company needs to provide remote access to your company’s internal network over the Internet, one popular and secure option is to employ a secure Virtual Private Network (VPN) system accompanied by strong two-factor authentication, using either hardware or software tokens.

Website Security

Carefully plan and address the security aspects of the deployment of a public web server.
Implement appropriate security management practices and controls when maintaining and operating a secure web server, Ensure that web server operating systems meet your organization’s security requirements. Ensure that only appropriate content is published on your website. Ensure appropriate steps are taken to protect web content from unauthorized access or modification.

Email

Set up a spam email filter, train your employees in responsible email usage. Protect sensitive information sent via email, work on developing a sensible email retention and email usage policies

Summary

As we can see that cyber security is divided into two main aspects, physical ones and software ones. Many consideration must be taken while planning your security system. Cyber security strength is measured by how much weakness or vulnerable points are protected. Also it's must to be motioned that security breaches can be occurred by the simplest and unexpected ways. And always remember YOU'RE NEVER TOO SMALL TO BE ATTACKED.

Sort:  

Excellent post. though you beat me to the punch. i have a script half finished on the same topic. DOH! great all the same. upvoted and resteemed.

I have some materials I made about two years ago on some topics about CyberSecurity. and this materials were made for non technical folks. and since the contract had been ended I can share them now
if you are interested i can send two of them (each one about 25 pages). or you can find some of them posted on my blog here in steemit

Thanks for your comment and the upvote

don't worry about it. im fairly tech savy, i just never got round to finishing it. ;)

Good LUCK !! :) :)

Congratulations @abdelhameedqotb! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

You got a First Reply

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!

Coin Marketplace

STEEM 0.17
TRX 0.13
JST 0.027
BTC 58974.49
ETH 2666.08
USDT 1.00
SBD 2.45