Distributed enterprises face ongoing challenges when it comes to maintaining network security.
Quite often businesses operating from multiple locations will have minimal on-site resources beyond their HQ or main location, lack IT technology expertise and will process highly sensitive data while employing weaker security practises. As a result they are viewed as a soft target.
As a result, they need to take extra care and protect the Network’s Edge from malicious attacks. According to Gartner, by 2016 thirty per cent of advanced threats will specifically target distributed locations as the entry point. Criminals are increasingly viewing distributed enterprises as an easy target and organisations need to start to mitigate the risks and employ best practise techniques.
Visibility - Ensuring device visibility is the key to any security strategy. With many new devices joining enterprise networks, visibility into mobile networks is becoming critical. Network administrators need the ability to identify, track, and categorise all devices accessing the network. Device visibility provides IT with real- time inventory and security intelligence for active remediation while allowing users to seamlessly connect to the network without disruptions or changes in end-user experience.
Discipline - A disciplined approach to security at the Network’s Edge can play a major role. Regular audits should be conducted to maintain up-to-date and accurate network topologies (logical and physical). Use a common set of security controls for policy management, and institute governance, risk, and compliance security best practices.
Internal communication - Strong collaboration and communication across teams within the IT organisation is also key to creating a reliable and uniform approach.
Key security protocols – It is imperative for enterprises to teach and enforce employee security protocols. In particular, employees should be trained to recognise and report phishing emails – they should be able to spot the common signs of suspicious communication, such as encouragement to click on links, especially examples that are unfamiliar or do not match the supposed source’s web address. Urgent requests to provide information, call a phone number, or download attachments are also a danger sign, along with bad spelling or unusual grammar.
Beyond organisational and strategic efforts to improve security, specific policies, such as controlling entry points to routers and correctly configuring network firewalls are a vital steps in minimising the risks of a security breach.
BYOD - With the explosion of ‘Bring Your Own Device’ (BYOD) and mobility, there are more network access points than ever before. Organisations should also create segmented safety zones and implement Parallel Networking to deliver extra layers of security. Network segmentation allows for the partitioning of the network into “security zones,” or segments separated by firewalls. Properly configured segments separate applications and prevent access to sensitive data. A Point-of-Sale system, for example, should operate on a segment separate from third party applications, employee email, or public WiFi.
This limits the ability of attackers to pivot from one application to another, and allows network administrators to manage the quality of service (QoS) on specific segments, prioritising bandwidth usage for mission-critical applications.
Networks - In contrast to segmenting a single network, creating multiple Parallel Networks is a relatively simple solution. Separate applications are assigned completely separate networks, or “air-gapped.” This physical separation of data further prohibits attackers from using a compromised device to pivot to other servers and networks, including those that hold sensitive data.
Data breaches - Based on information collected by Verizon, a global network carrier, for the 2015 Data Breach Investigations Report, twenty-three per cent of recipients now open phishing messages and eleven percent click on attachments. This allows attackers onto the network, set up camp and continue to work to find vulnerabilities. Because of this, enterprises should consider hosting customer WiFi, employee devices, and Point-of-Sale systems on their own respective networks.
BYON - Enterprises should also expect third parties such as vendors, partners and kiosks who require Internet access to “Bring Your Own Network.” By expecting third parties to provide their own Parallel Networks, the company can retain governance over its own network functions, while reducing the overall scope of work to maintain network security.
Parallel Networks significantly reduce the amount of time and expertise needed to segment networks based on application, and limit the scope of work for maintaining PCI Compliance on the network used for transmitting cardholder data.
Mitigating the risks
Enterprises with distributed locations or branch offices are at the highest risk of suffering data breaches, but the primary focus is often placed on securing central systems rather than vulnerabilities at the Edge.
An approach, which focuses on specific initiatives to protect the Network’s Edge, can help organisations stay out of the headlines in the fight against serious and ongoing security risk.
Kent Woodruff, Chief Security Officer, Cradlepoint