SlideShare a Scribd company logo
By CyberGuy December 14, 2021 Network Security Audit
The Top 5 Basics Fundamentals of
Network Security No Comments

Recent Posts
FAQs About Website Security?
Network Security Management
Services
Reasons Why Your Organisation
Needs Network Security Like Never
Before!
Threat Hunting Service – What You
Need To Know
Tips for Small and Medium
Businesses on Cyber Security
Archives
January 2022
December 2021
October 2021
September 2021
February 2021
January 2021
December 2020
November 2020
October 2020
July 2020
June 2020
February 2020
January 2020
November 2019
October 2019
September 2019
August 2019
July 2019
March 2019
February 2019
January 2019
February 2018
January 2018
November 2017
October 2017
August 2017
July 2017
June 2017
May 2017
Search... 
Table of Contents
The most common threats to your systems
Top 5 fundamentals of network security
Keep patches and updates current
Use strong passwords
Secure your VPN
Actively manage user access privileges
Clean up inactive accounts
Cyber crooks, angry current and former workers, and negligent users may knock your computer networks down
and endanger data. Network security is comprised of the hardware, software, policies, and procedures meant to
protect your company’s computer systems from both internal and external threats. Multiple hardware and
software layers can keep attacks from wreaking havoc on computer networks and preventing them from
propagating if they do get past your defences.
The most common threats to your systems
Viruses, worms, Trojan horses, spyware, malware, adware, and botnets are all examples of malicious
software.
Data theft
Denial of Service (DoS) and Distributed Denial of Service Attacks (DDoS)
Zero-day and zero-hour attacks
Hacker attacks
These threats look to exploit:
Wireless networks that aren’t secure
Software and hardware that hasn’t been patched
Websites that are not secure
Potentially unwanted applications (PUAs)
Passwords that are easy to guess
Devices that have gone missing
Users who are unaware of their actions or who have an evil purpose
Top 5 fundamentals of network security
These network security essentials are critical for avoiding downtime, complying with government regulations,
reducing liability, and protecting your
reputation:
1. Keep patches and updates
current
When administrators fail to deploy patches
and updates, cyber thieves take advantage
of vulnerabilities in operating systems,
software programs, web browsers, and
browser plug-ins.
Check sure workplace PCs are running the
most recent versions of the following frequently used programs:
Adobe Acrobat and Reader
Microsoft Office Suite
Adobe Flash
Microsoft Internet Explorer
Oracle Java

Protection & Monitoring Security Services Who We Work With Careers Talk To Us 
Book A Discussion Call: 1 833 CYBHUNT Contact Us
Tags: Cloud Security Services Providers Cloud Web Security Service Cyber Security Companies Toronto
Cyber Security Company Canada Network Security Toronto
ay 0
January 2017
O ac e Ja a
Maintain an inventory to ensure that all equipment, including mobile devices and network infrastructure, is
updated regularly. Also, make sure that automatic updates are turned on on your Windows and Apple systems.
2. Use strong passwords
Most users are aware that they should not write their passwords on Post-It Notes stuck to their displays.
However, keeping passwords safe requires more than just keeping them hidden.
A strong password is one that is difficult for people and computers to decipher, is at least six characters long,
ideally more, and has a mix of upper- and lower-case letters, numbers, and symbols.
Symantec gives additional suggestions:
Use only terms that aren’t in the dictionary. Avoid using proper nouns or foreign terms as well.
Use nothing that has anything to do with your name, nickname, family members, or pets.
Don’t use any numbers that may be guessed from your mail, such as phone numbers or street addresses.
Choose a sentence that has meaning for you and turn the initial letters of each word into characters.
3. Secure your VPN
When it comes to safeguarding a VPN, data encryption and identity authentication are very critical. Hackers may
use any open network connection to gain access to your network. Furthermore, data is especially sensitive when
being sent via the Internet. Examine your server and VPN software documentation to ensure that the best
encryption and authentication techniques are being used.
The most secure way of identity identification is multi-factor authentication. It’s preferable if your users have to
go through extra procedures to establish their identity. Users may, for example, be forced to input a PIN in
addition to a password. Alternatively, a PIN or password might be used in combination with a random number
code produced every 60 seconds by a key-fob authenticator.
A firewall is a smart option to keep the VPN network isolated from the rest of the network.
Here are some more suggestions:
Instead of using a VPN, use cloud-based email and file sharing.
Create and enforce access rules for users. When it comes to giving workers, contractors, and business
partners access, be cautious.
Confirm that staff are aware of how to protect their wireless networks at home. Through an unsecured VPN
connection, malicious malware infecting their devices at home may infect the workplace network.
Check for up-to-date anti-virus software, firewalls, and spam filters on mobile devices before providing them
full network access.
4. Actively manage user access privileges
User access rights that are not suitable represent a severe security risk. It’s important to keep track of employee
access to sensitive data regularly. More than half of the 5,500 businesses polled by HP and the Ponemon Institute
stated their workers have access to “sensitive, private data beyond the scope of their job responsibilities.”
“General business data, including as papers, spreadsheets, emails, and other kinds of unstructured data, were
most at danger for eavesdropping, followed by customer data,” according to eWeek.com, which reported on the
study’s results. When an employee’s job title changes, notify the IT department to adjust their access credentials
to reflect the new position’s responsibilities.
5. Clean up inactive accounts
Hackers obtain access and hide their activities by using dormant accounts that were previously given to
contractors and former workers. According to the HP/Ponemon Institute analysis, organizations in the survey
performed a decent job of removing accounts once an employee departed or was laid off. Inactive accounts on
big networks with numerous users may be cleaned out using the software.
For more information about Network Security, please contact us at (833) 292-4868 today.
Cyber Security & Pen Test Consultants in Canada, the US and the Caribbean 



BO O K A DIS C O V E RY ME E TIN G

Protection & Monitoring Security Services Who We Work With Careers Talk To Us 
Book A Discussion Call: 1 833 CYBHUNT Contact Us
Cyber Security Services
Pen Testing | Threat Hunting |
Network Security Audits |
Vulnerability Assessments | vCISO
Locations
Canada
251 Laurier Ave. W. Suite 900
Ottawa, ON
K1P 5J6
439 University Ave.
Toronto, Ontario, Canada
M5G 2H6
U.S.
99 Hudson St.
New York, New York, USA
10013
CyberHunter in the News
In the news: Canada vulnerable to
Russian cyber attacks, says  CEO of
CyberHunter Chris
Dodunski 
In the news:
Windows XP holdouts
vulnerable to hackers
– CBC News · Posted: Feb 11, 2014
2:51 PM ET | by Chris Dodunski
In the news: Cyber Threat Hunting:
A New Dimension of Cyber
Intelligence – With Chris Dodunski
In the news: Flipping the Script on
Cyber Threats from Being the
Hunted to the Hunter – Chris
Dodunski
Canadian Cyber Security Firm
CyberHunter Ramping Up –
Canadian companies completely
unprepared to combat cyber
criminals.  Read More
Navigation
Remote Worker Protection
Secure Website Hosting
Cyber Security Services
Penetration Testing
Network Security
Website Security
Cloud Security
Cyber Threat Hunting
Vulnerability Scanning
Request A Quote
About Us
Meet the Cyber Security Experts

Cyber Security Blog
Contact Us
1 833 CYBHUNT
evolve@cyberhunter.solutions
ARIBA




UpCity
© 2022 Cyberhunter Cyber Security | Network Security, Cloud Security & Website
Security | Penetration Testing | Vulnerability Assessments | Threat Hunting.
Site By
MEDIAFORCE Privacy Policy. Sitemap
  

Protection & Monitoring Security Services Who We Work With Careers Talk To Us 
Book A Discussion Call: 1 833 CYBHUNT Contact Us

More Related Content

PPT
New internet security
PPTX
Hyphenet Security Awareness Training
PPTX
Cyber security awareness for end users
PPTX
Internet security
PPTX
Hyphenet Security Awareness Training
PDF
Cybersecurity Awareness Training Presentation v1.0
DOC
Data security
PPTX
Information security awareness - 101
New internet security
Hyphenet Security Awareness Training
Cyber security awareness for end users
Internet security
Hyphenet Security Awareness Training
Cybersecurity Awareness Training Presentation v1.0
Data security
Information security awareness - 101

What's hot (20)

PDF
Internet security
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
PDF
Internet Security
PDF
Cyber Security
PPTX
Internet security powerpoint
PPTX
Cybersecurity Awareness Session by Adam
PPT
Tutorial 09 - Security on the Internet and the Web
 
PDF
Cyber security awareness presentation nepal
PPT
Cyber Security and Cyber Awareness
PPT
091005 Internet Security
PPTX
Cyber Security for Financial Planners
PPTX
Cybersecurity Awareness Training
PPTX
Internet Issues (How to Deal on Internet Security)
PDF
Email Security Threats: IT Manager's Eyes Only
PPTX
What is Phishing - Kloudlearn
PPT
Network Security
ODP
Cyber security awareness
PDF
Security Awareness Training
PPTX
Information Security Awareness: at Work, at Home, and For Your Kids
PPT
Tutorial 9 - Security on the Internet
 
Internet security
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Internet Security
Cyber Security
Internet security powerpoint
Cybersecurity Awareness Session by Adam
Tutorial 09 - Security on the Internet and the Web
 
Cyber security awareness presentation nepal
Cyber Security and Cyber Awareness
091005 Internet Security
Cyber Security for Financial Planners
Cybersecurity Awareness Training
Internet Issues (How to Deal on Internet Security)
Email Security Threats: IT Manager's Eyes Only
What is Phishing - Kloudlearn
Network Security
Cyber security awareness
Security Awareness Training
Information Security Awareness: at Work, at Home, and For Your Kids
Tutorial 9 - Security on the Internet
 
Ad

Similar to The top 5 basics fundamentals of network security cyberhunter solutions (20)

PDF
Securing Your Intellectual Property: Preventing Business IP Leaks
PDF
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
PPTX
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
PDF
CYB 102 – Fundamentals of Cyber Security 3.pdf
PDF
CYB 102 – Fundamentals of Cyber Security 3.pdf
PPT
Information Security Seminar
PPTX
Can your company survive a modern day cyber attack?
PDF
Cybersecurity Awareness E-Book - WeSecureApp
PDF
Enhancing Cybersecurity in Remote Work-3.pdf
PPTX
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PDF
Securing Devices at Home
PPTX
Cyber Security School Workshop
PPTX
Cybersecurity Basics of awareness presentation .pptx
PPTX
Cybersecurity Basics of awareness presentation .pptx
PDF
Cyber Privacy & Password Protection
PPTX
Cyber Security Seminar
PPT
Dos and Dont to be followed to protect information and technology
PPTX
For CyberSecurity.pptx which helps students whose are want to learn
PDF
7 Best Cyber Security Practices for Small Businesses.pdf
PDF
Building a culture of security
Securing Your Intellectual Property: Preventing Business IP Leaks
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
CYB 102 – Fundamentals of Cyber Security 3.pdf
CYB 102 – Fundamentals of Cyber Security 3.pdf
Information Security Seminar
Can your company survive a modern day cyber attack?
Cybersecurity Awareness E-Book - WeSecureApp
Enhancing Cybersecurity in Remote Work-3.pdf
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
Securing Devices at Home
Cyber Security School Workshop
Cybersecurity Basics of awareness presentation .pptx
Cybersecurity Basics of awareness presentation .pptx
Cyber Privacy & Password Protection
Cyber Security Seminar
Dos and Dont to be followed to protect information and technology
For CyberSecurity.pptx which helps students whose are want to learn
7 Best Cyber Security Practices for Small Businesses.pdf
Building a culture of security
Ad

More from Cyberhunter Cyber Security (6)

PDF
cyberhuntersecurity - network-security-in-canada-cyberhunter-cyber-security-.pdf
PDF
Penetration Test Reports Key Elements And Best Practices - Cyberhunter Soluti...
PDF
Cyberhunter Solutions Cyber Security Company Canada.pdf
PDF
Cyberhunter solutions cyber security toronto.pdf
PDF
Cyberhunter Solutions - Reasons Why Your Organisation Needs Network Security...
PDF
What cybersecurity risk management entails
cyberhuntersecurity - network-security-in-canada-cyberhunter-cyber-security-.pdf
Penetration Test Reports Key Elements And Best Practices - Cyberhunter Soluti...
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter Solutions - Reasons Why Your Organisation Needs Network Security...
What cybersecurity risk management entails

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
Chapter 3 Spatial Domain Image Processing.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity

The top 5 basics fundamentals of network security cyberhunter solutions

  • 1. By CyberGuy December 14, 2021 Network Security Audit The Top 5 Basics Fundamentals of Network Security No Comments  Recent Posts FAQs About Website Security? Network Security Management Services Reasons Why Your Organisation Needs Network Security Like Never Before! Threat Hunting Service – What You Need To Know Tips for Small and Medium Businesses on Cyber Security Archives January 2022 December 2021 October 2021 September 2021 February 2021 January 2021 December 2020 November 2020 October 2020 July 2020 June 2020 February 2020 January 2020 November 2019 October 2019 September 2019 August 2019 July 2019 March 2019 February 2019 January 2019 February 2018 January 2018 November 2017 October 2017 August 2017 July 2017 June 2017 May 2017 Search...  Table of Contents The most common threats to your systems Top 5 fundamentals of network security Keep patches and updates current Use strong passwords Secure your VPN Actively manage user access privileges Clean up inactive accounts Cyber crooks, angry current and former workers, and negligent users may knock your computer networks down and endanger data. Network security is comprised of the hardware, software, policies, and procedures meant to protect your company’s computer systems from both internal and external threats. Multiple hardware and software layers can keep attacks from wreaking havoc on computer networks and preventing them from propagating if they do get past your defences. The most common threats to your systems Viruses, worms, Trojan horses, spyware, malware, adware, and botnets are all examples of malicious software. Data theft Denial of Service (DoS) and Distributed Denial of Service Attacks (DDoS) Zero-day and zero-hour attacks Hacker attacks These threats look to exploit: Wireless networks that aren’t secure Software and hardware that hasn’t been patched Websites that are not secure Potentially unwanted applications (PUAs) Passwords that are easy to guess Devices that have gone missing Users who are unaware of their actions or who have an evil purpose Top 5 fundamentals of network security These network security essentials are critical for avoiding downtime, complying with government regulations, reducing liability, and protecting your reputation: 1. Keep patches and updates current When administrators fail to deploy patches and updates, cyber thieves take advantage of vulnerabilities in operating systems, software programs, web browsers, and browser plug-ins. Check sure workplace PCs are running the most recent versions of the following frequently used programs: Adobe Acrobat and Reader Microsoft Office Suite Adobe Flash Microsoft Internet Explorer Oracle Java  Protection & Monitoring Security Services Who We Work With Careers Talk To Us  Book A Discussion Call: 1 833 CYBHUNT Contact Us
  • 2. Tags: Cloud Security Services Providers Cloud Web Security Service Cyber Security Companies Toronto Cyber Security Company Canada Network Security Toronto ay 0 January 2017 O ac e Ja a Maintain an inventory to ensure that all equipment, including mobile devices and network infrastructure, is updated regularly. Also, make sure that automatic updates are turned on on your Windows and Apple systems. 2. Use strong passwords Most users are aware that they should not write their passwords on Post-It Notes stuck to their displays. However, keeping passwords safe requires more than just keeping them hidden. A strong password is one that is difficult for people and computers to decipher, is at least six characters long, ideally more, and has a mix of upper- and lower-case letters, numbers, and symbols. Symantec gives additional suggestions: Use only terms that aren’t in the dictionary. Avoid using proper nouns or foreign terms as well. Use nothing that has anything to do with your name, nickname, family members, or pets. Don’t use any numbers that may be guessed from your mail, such as phone numbers or street addresses. Choose a sentence that has meaning for you and turn the initial letters of each word into characters. 3. Secure your VPN When it comes to safeguarding a VPN, data encryption and identity authentication are very critical. Hackers may use any open network connection to gain access to your network. Furthermore, data is especially sensitive when being sent via the Internet. Examine your server and VPN software documentation to ensure that the best encryption and authentication techniques are being used. The most secure way of identity identification is multi-factor authentication. It’s preferable if your users have to go through extra procedures to establish their identity. Users may, for example, be forced to input a PIN in addition to a password. Alternatively, a PIN or password might be used in combination with a random number code produced every 60 seconds by a key-fob authenticator. A firewall is a smart option to keep the VPN network isolated from the rest of the network. Here are some more suggestions: Instead of using a VPN, use cloud-based email and file sharing. Create and enforce access rules for users. When it comes to giving workers, contractors, and business partners access, be cautious. Confirm that staff are aware of how to protect their wireless networks at home. Through an unsecured VPN connection, malicious malware infecting their devices at home may infect the workplace network. Check for up-to-date anti-virus software, firewalls, and spam filters on mobile devices before providing them full network access. 4. Actively manage user access privileges User access rights that are not suitable represent a severe security risk. It’s important to keep track of employee access to sensitive data regularly. More than half of the 5,500 businesses polled by HP and the Ponemon Institute stated their workers have access to “sensitive, private data beyond the scope of their job responsibilities.” “General business data, including as papers, spreadsheets, emails, and other kinds of unstructured data, were most at danger for eavesdropping, followed by customer data,” according to eWeek.com, which reported on the study’s results. When an employee’s job title changes, notify the IT department to adjust their access credentials to reflect the new position’s responsibilities. 5. Clean up inactive accounts Hackers obtain access and hide their activities by using dormant accounts that were previously given to contractors and former workers. According to the HP/Ponemon Institute analysis, organizations in the survey performed a decent job of removing accounts once an employee departed or was laid off. Inactive accounts on big networks with numerous users may be cleaned out using the software. For more information about Network Security, please contact us at (833) 292-4868 today. Cyber Security & Pen Test Consultants in Canada, the US and the Caribbean BO O K A DIS C O V E RY ME E TIN G  Protection & Monitoring Security Services Who We Work With Careers Talk To Us  Book A Discussion Call: 1 833 CYBHUNT Contact Us
  • 3. Cyber Security Services Pen Testing | Threat Hunting | Network Security Audits | Vulnerability Assessments | vCISO Locations Canada 251 Laurier Ave. W. Suite 900 Ottawa, ON K1P 5J6 439 University Ave. Toronto, Ontario, Canada M5G 2H6 U.S. 99 Hudson St. New York, New York, USA 10013 CyberHunter in the News In the news: Canada vulnerable to Russian cyber attacks, says  CEO of CyberHunter Chris Dodunski  In the news: Windows XP holdouts vulnerable to hackers – CBC News · Posted: Feb 11, 2014 2:51 PM ET | by Chris Dodunski In the news: Cyber Threat Hunting: A New Dimension of Cyber Intelligence – With Chris Dodunski In the news: Flipping the Script on Cyber Threats from Being the Hunted to the Hunter – Chris Dodunski Canadian Cyber Security Firm CyberHunter Ramping Up – Canadian companies completely unprepared to combat cyber criminals.  Read More Navigation Remote Worker Protection Secure Website Hosting Cyber Security Services Penetration Testing Network Security Website Security Cloud Security Cyber Threat Hunting Vulnerability Scanning Request A Quote About Us Meet the Cyber Security Experts Cyber Security Blog Contact Us 1 833 CYBHUNT evolve@cyberhunter.solutions ARIBA UpCity © 2022 Cyberhunter Cyber Security | Network Security, Cloud Security & Website Security | Penetration Testing | Vulnerability Assessments | Threat Hunting. Site By MEDIAFORCE Privacy Policy. Sitemap     Protection & Monitoring Security Services Who We Work With Careers Talk To Us  Book A Discussion Call: 1 833 CYBHUNT Contact Us