Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Data security – network port controls

One of the most common ways hackers will exploit and attack a business Network is through open and unsecure network ports.  By using a default or “easy to guess” user/password combination, hackers can gain access through network services and software such as mail servers, email servers, DNS servers, VOIP servers, and other network servers.  Here are a few tips to help you close and monitor your network ports to prevent these type of attacks.

  1. Install a firewall(s) and a network port filtering tool and set rules to only allow business verified network traffic and to monitor  all network traffic.
  2. Routinely check and install security patch updates.
  3. Maintain and audit these applications on a regular basis to ensure all rule, patches, and services are up to date.
  4. Routinely audit all ports and protocols, perform automated port scans, and compare results and settings to your asset management system.
  5. Ensure systems are in place to routinely and quickly alert when unauthorized ports are installed and opened.
  6. It may be necessary to maintain critical servers in isolated environments with no internet access.

Follow these simple steps to manage your network ports and prevent potential hacking exploits of your network.

About the author

Related posts:

  1. Data security – reviewing your logging records
  2. Data security – securing your data and preventing data loss
  3. Data security – Network perimeter defense


This post first appeared on Wilkins Consulting, please read the originial post: here

Share the post

Data security – network port controls

×

Subscribe to Wilkins Consulting

Get updates delivered right to your inbox!

Thank you for your subscription

×