top of page
  • Writer's pictureWebKeeper

Cyber Checklist (Part 2): Manage Your Network

We are ending out Cybersecurity Awareness Month with a 6 part Cyber Checklist by which to improve your organization's cyber program. Good luck and contact us when Tuearis Cyber can help!


Manage Your Network and Endpoints

Ponemon Institute in 2019 reported, "73% of Executives indicate they have little or no insight into what physical devices are connecting to their network." These unknown devices present incredible risks to the organization. Managing your network and endpoints should include all of the following:


Actively inventory all network assets and classify them by risk

You cannot protect what you don't know exists. The tools and processes needed to keep an accurate inventory of the network are essential, not optional, to security.


Create buffers between different tiers of priviliged access levels

Privileges should not be escalated easily. Create buffers to protect data that you don't want to be shared.


Continually scan your endpoints and apply patches

OS and third party softwares need regular patching. A good TVM program will help you know that threats are present and remediate them.


Use DNS filtering to protect against malicious websites

Failing to filter the websites your users are visiting is an open door for attackers.


Develop a Standard Operating Procedure (SOP) for auditing firewall policies and critical endpoints

How often and how well the network and endpoints are audited can make all of the difference!


Build a program for visualization and alert management for endpoint security

Too often alerts are never seen or ignored. Even good endpoint protection platforms need regular review, tuning, and alert investigation.


Join us for the rest of the series in the following days!

12 views0 comments

Recent Posts

See All
bottom of page