This week’s network security tip comes examines the idea of being able to classify sensitive data and implementing multiple security layers to ensure its protection.
So far we’ve posted tips just from customers, but this week we’ll take one from our own Kyle Wickert (see his blogs on cloud security and understanding applications that flow through the network) who offers the following recommendation…
“Implementing layer 3 controls is not enough! Implementing basic firewall rules is no longer enough to protect your endpoints from potential attacks and intruders. A perfectly legitimate connection over a common port such as SSH may seem simple enough. However it is important to understand the sensitivity of data moving over the connection and the authentication/authorization controls in place on the destination endpoint(s).”
What are the controls that you think organizations should implement at a minimum? Share them with us!
Receive notifications of new posts by email.
We don not ask your personal information to access any of our resources.