If you haven’t recently, you should do some auditing and mapping of your network. Always have a clear understanding of the entire network’s infrastructure, for instance the vendor/model, location, and basic configuration of firewalls, routers, switches, Ethernet cabling and ports, and wireless access points. Plus know exactly what servers, computers, printers, and any other devices are connected, where they are connected, and their connectivity path throughout the network.
During your auditing and mapping you might find specific security vulnerabilities or ways in which you could increase security, performance and reliability. Maybe you’ll run across an incorrectly configured firewall or maybe physical security …show more content…
Remember even with VLANs and 802.1X authentication, someone can eavesdrop on the network (VLAN) to capture unencrypted traffic that could include passwords, emails and documents.
Although you can encrypt all the traffic, first analyze your network. It might make more sense to just encrypt select communications you deem the most sensitive that isn’t already encrypted, such as through SSL/HTTPS. You can pass the sensitive traffic through a standard VPN on the client, which could be used just during the sensitive communication or forced to be used all the time.
3.2.6 Create a security culture in your company.
Ultimately, everyone who has a user name and password is responsible for keeping company data secure. Periodically remind your managers and employees that it is important to the company's future that they do not share log-in information. Encourage them to be more vigilant with securing their passwords. Writing passwords on a sticky note placed under a keyboard or in a file saved on a computer should be prohibited. Take internal data security protocols seriously.
3.2.7 Isolated Execution Environments
Isolating execution environments refers to any method in which individual components are run within their own dedicated