
Web servers along with any forward facing systems, require current patches and updates. Utilize monitoring and logging tools to alert you and your team of any possible vulnerabilities or threats to these systems.
Firewalls
Firewall software and system updates should always be current. Scheduled backups of your firewall configurations are a good idea.
Go through your rules and policies. Make sure you don’t have any exposed or overexposed ports.
Exchange Servers
Exchange mail systems are very popular. This popularity is not an accident. Exchange runs on Windows and features Outlook Web Access (OWA). OWA is super convenient and relatively easy to use.
Keep your Exchange servers patched and updated. It’s a good idea to schedule these patches and updates. Also utilize monitoring and logging tools to alert you and your team of possible vulnerabilities or threats to mail and messaging systems.
Consider implementing 2 factor authentications. Your end user community and team may gripe a bit however explaining the importance of taking this step usually helps in these situations.
Good password policies are always a good idea. Especially when dealing with Internet front facing systems, a strong password policy is a rule to follow.
End Point Security
A centralized anti-virus solution is recommended. Anti-virus scans should be scheduled regularly. It’s also very important to keep ant-virus software and definition files up to date. Utilize logging and monitoring tools to alert you and your team of possible vulnerabilities or threats. It’s also good to have reporting enabled or configured to create incidents or tasks for resolving anti-virus issues.
This is a where mobile deice management is major. Utilizing MDM, you can push policies to mobile device that restrict potential dangerous or unauthorized applications.
Encryption
Encryption of your organization’s laptops, mobile devices and portable storage devices is encouraged. Whenever your data moves from one system to another, security is a major concern.
Wireless Security
In today’s super connected however rapidly growing wireless device world, a Wi-Fi solutions is almost a necessity. I’m going to make some suggestions for your wireless network.
- Implementing a wireless solution that integrates with your directory service is recommended.
- When allowing guests access to your wireless network, implement a good access policy. A policy which changes the access code or password daily is a good idea.
- Keep a separate SSID for your guests.
- Configure your wireless network to defend against and alert your team of rouge wireless routers or access points.
SSL Certificates
Using SSL certificates ensures the data being transmitted between a browser and a web server is encrypted. If you require additional information or support for acquiring or implementing SSL certificates, please hesitate contacting www.Danntech.net.
Consider that Macy’s, Sears, Best Buy, Adidas, Panera Bread, Kmart and Under Amour had to report being hacked in 2018. That’s just to name a few.
Cyber Security is a big deal.
For those managing IT for organizations that are running in a VDI environment, you can maybe breeze by this section. However if you’re deploying workstations in any capacity, the following is useful information.
I rank education as the number one defense against cyber attacks. The runner up is a tie between mobile devices and workstations. Let’s briefly discuss workstation engineering.
Sometimes referred to as Desktop Support, I categorize Workstation Engineering as an encapsulating tier of supporting desktops. Primarily due to many clients we support are not operating in a virtual desktop infrastructure. If this is the case for your organization, you’re probably deploying and supporting workstations in some capacity.
As mentioned before, your inventory is best kept updated and accurate. There can be many areas of frustration in IT. One of which is when an end user’s workstation needs to be replaced and you have no spare to deploy. Or worse, you thought you had a spare and come to find out, you do not. In short, keep your workstation inventory up to date.
Workstation Inventory
It’s good practice to keep some spare workstation items in house. Items such as:
2 Workstation Items Inventory
Memory | Video Cables |
Video Cards | Monitors |
NICs | Mice |
Video Adaptors | Mouse pads |
Speakers | Keyboards |
USB Storage Devices | Wireless Adaptors |