SHARE
Facebook X Pinterest WhatsApp

7 Security Mindsets to Protect Your Vital Business Assets

Network security isn’t just about devices or hardware. While it’s easy to think that one tool will solve your security burden, the reality is that cyber criminals are determined to get into your network, steal data or disrupt performance. By constantly evolving their methods, hackers often find new vulnerabilities to exploit. For that reason, the […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Sep 15, 2015

Network security isn’t just about devices or hardware. While it’s easy to think that one tool will solve your security burden, the reality is that cyber criminals are determined to get into your network, steal data or disrupt performance.

By constantly evolving their methods, hackers often find new vulnerabilities to exploit. For that reason, the tool that works today will likely be much less effective tomorrow. And beyond that, every network is different. What might make sense for one might not make sense for another.

To help businesses learn to adopt lasting mindsets to keep their networks safe, David Lissberger, chief executive officer at Sentinel IPS, outlined seven strategies businesses must adopt as guiding principles when designing and building a network’s architecture.

David Lissberger is chief executive officer at Sentinel IPS, a managed service that relieves the burden of network security for businesses with its threat management system based on active threat intelligence.

7 Security Mindsets to Protect Your Vital Business Assets - slide 1

7 Must-Adopt Security Strategies

Click through for seven strategies organizations should adopt as guiding principles when designing and building a network’s architecture, as identified by David Lissberger, chief executive officer at Sentinel IPS.

7 Security Mindsets to Protect Your Vital Business Assets - slide 2

Make It Difficult

Make it harder to exploit your network.

Most security breaches don’t occur because someone has discovered a way to take advantage of a network vulnerability. Instead, most unwelcome visitors enter the data center through legitimate methods, like simply typing in an active username and password. Take the time to educate your employees on hacking tactics like social engineering, because being able to spot and avoid these scams means fewer unwanted visitors.

It’s critical to do these three things consistently with your staff:

  1. Preach rock solid login security with great passwords.
  2. Lock down application logins as much as possible to prevent brute force logins.
  3. Reinforce the importance of not being casual with login information.

7 Security Mindsets to Protect Your Vital Business Assets - slide 3

Layer Security

Layer security across your network.

As the traditional idea of a network begins to change, layered security is only going to become more important. The SANS Institute reminds us that there is no such thing as a silver bullet, and it takes many technologies and processes to provide comprehensive risk and security management.

These layers traditionally include:

  • An IPS and firewall at the perimeter
  • Antivirus protection at the endpoints
  • Smart switches and a SIEM to collect and monitor the data inside your network

Never assume you are safe; instead, be proactive by developing comprehensive layers of protection and by continually checking your systems to adjust as needed.

7 Security Mindsets to Protect Your Vital Business Assets - slide 4

Create a Baseline

Create a baseline for your network so you know what’s normal.

After building layered security into your network, you’ll also need to establish a baseline to measure against so you know when something is potentially wrong.

There are several tools that can help monitor the amounts of traffic traveling over certain ports. Who’s talking to those assets? When, why, and how much? This baseline will give you a yardstick to measure future traffic against.

7 Security Mindsets to Protect Your Vital Business Assets - slide 5

Be Proactive

Act on what your data tells you.

Layered security creates a lot of data, and the more data you have, the more difficult it is to act on it. Prioritizing your important assets can help you sift through the data, but in today’s world, it’s not enough to act only when you see something is wrong.

The data you are collecting becomes even more valuable when you can use it to be proactive about threat protection. Use this data to stop individuals before they do anything by placing reputation information into your firewall or your IPS, or having that information in your SIEM.

7 Security Mindsets to Protect Your Vital Business Assets - slide 6

Implement Threat Intelligence

You don’t have to try and tackle network security in a vacuum. It’s common for businesses to share their latest threat information with others, and often for free. To make your network defenses stronger, use this information whenever possible.

Some free threat intelligence resources include:

7 Security Mindsets to Protect Your Vital Business Assets - slide 7

Stay Current

Stay current on the latest threats and trends.

It’s important to know the latest threats and trends, and now with social media, it’s easier than ever before. Sign up with Twitter and start following these top sources for network security news.

Suggested Twitter resources:

  • @briankrebs
  • @CIOonline
  • @cyberdefensemag
  • @DarkReading
  • @CISecurity
  • @SearchSecurity
  • @SecIntelligence
  • @Securelist

7 Security Mindsets to Protect Your Vital Business Assets - slide 8

Prepare for the Worst

Adopt the “assume breach” mentality.

Planning for network security should start from the assumption that you’re going to be breached. Thinking your business isn’t important enough or is too small to hack is one of a few security attitudes you need to change. Even if you’re a small organization, you have assets that may be important to somebody. Prepare for the worst by focusing on visibility across your network, putting in reliable backups and implementing a solid disaster recovery plan.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.