What should be included in my network security? – Part 2


Photo by Rockstar Working Ahmad Ali , used with permission under CC  license

Internet Security: Protecting From Data Breaches on the Inside

Last week we discussed internet security, how to create a “digital fortress” with defense in depth.  If you have all of the systems in place that we discussed you probably believe yourself secure.  Although you are more secure than many, there are still chinks in the armor that can be exploited.  One such potential problem arises with employees using their own devices (BYOD).  For the longest time, it was believed that the only defense against a threat from a personal device was anti-virus software on all your workstations and servers.  Certainly, it is important for network security to have anti-virus software, however, no A/V software is 100% secure.

Why Anti-Virus Software Does Not Always Work

The problem with A/V software arises because bad guys are constantly developing viruses and malware that exploit security holes and then the anti-virus community reacts to these attempts. This means there is always a lag time between the creation of a virus and the deployment of an update to the A/V software that protects against the new threat.  During this time your network is at risk.

With BYOD we can add a second or even third level of defense.  Many antivirus vendors now offer a version for Android and IOS. Therefore enforcing a BYOD policy that requires A/V software on all devices that connect to your network is becomes an additional line of defense.  Furthermore, modern security appliances, like the Meraki MX series have an option that includes Stateful, layer 3-7 deep packet inspection, intrusion detection and prevention, content filtering and a host of other applications designed to keep your network secure.

Stateful Packet Inspection: Information Security from the Inside Out

Effectively, this appliance looks deep into the individual data packets and determines if there is a threat.  If edge security is the equivalent to having security guards at the gate to your fortress, think of this as guards roaming throughout the fortress.  These guards effectively strip search every packet they come across and make sure they aren’t bringing, leaving with, or carrying something they shouldn’t.  This provides us additional defense in depth with protection on the portable device, the router and the individual permanent devices on the network.

In spite of all of this protection, no system is perfect.  There are non-digital threats to your data, such as fire, flooding, and other force majeure events.  In these cases, prevention is not as important as recovery.  Next week we will discuss disaster recovery considerations.

April 9, 2025
In today’s digital-first world, cybersecurity isn’t just a luxury—it’s a necessity. Whether you run a small startup or a growing enterprise in Fort Wayne , protecting your business’s data, systems, and clients is essential for long-term success. From ransomware attacks to phishing scams, cyber threats are evolving every day, and the best way to stay ahead of them is by partnering with a reliable IT services provider that understands the unique needs of local businesses. Here’s why investing in professional business IT support is one of the smartest decisions Fort Wayne businesses can make—and how working with SDTEK helps protect your operations, your data, and your reputation.
February 5, 2025
Protecting sensitive data is more critical than ever before. As cyber threats continue to rise, governments and regulatory bodies have introduced compliance frameworks to ensure businesses take appropriate measures to safeguard data. However, understanding these requirements can be overwhelming, especially since they vary by industry and location. We'll discuss some of the most common IT security compliance frameworks—such as HIPAA, CMMC, and CCPA—and explain their relevance to different industries. Whether you work in healthcare, manufacturing, or serving California residents, this guide will help you navigate the complex world of IT security compliance.