1 min read

CISA Aligned Solutions for Network Security in the wake of Telecom Hack

CISA Aligned Solutions for Network Security in the wake of Telecom Hack

The recent and potentially ongoing hack of global telecom companies is all over the news and illustrates how important it is to be diligent with your network security. CISA recently released a critical guide for network engineers and defenders with best practices to protect against successful exploitation carried out by bad actors. Here are some highlights from their guidance:

Strengthen Visibility

  • Closely scrutinize and investigate any configuration modifications or alterations to network devices such as switches, routers, and firewalls outside of the change management process
  • Implement a strong network flow monitoring solution
  • Monitor user and service account logins for anomalies that could indicate potential malicious activity. 
  • Implement secure, centralized logging with the ability to analyze and correlate large amounts of data from different sources. 
  • Implement a monitoring and network management capability that, enforces configuration management, automates routine administrative functions, and alerts on changes detected within the environment, such as connections and user and account activity.

Harden Systems and Devices

  • Use an out-of-band management network that is physically separate from the operational data flow network. Ensure that management of network infrastructure devices can only come from the out-of-band management network.
  • Employ strong network segmentation via the use of router ACLs, stateful packet inspection, firewall capabilities, and demilitarized zone (DMZ) constructs.
  • Harden and secure virtual private network (VPN) gateways by limiting external exposure and the port exposure to what is minimally required.
  • Ensure that no default passwords are used

 

Keeping your network and data safe is hard-Technium can help. Schedule a free consultation with one of our network security experts. 

 

Supplementing Network Encryption with MACsec

Supplementing Network Encryption with MACsec

Written by guest author, R. Leigh Hennig from Markley Group Overview A common way to encrypt the traffic between destinations is by setting up...

Read More
[Press Release] Technium Revolutionizes Cloud Access with The Fabric

2 min read

[Press Release] Technium Revolutionizes Cloud Access with The Fabric

MARLBOROUGH, MA — Technium, a global leader and innovator in networking and security, today announced the launch of its revolutionary secure cloud...

Read More
Physical vs Virtual Firewalls [What You Need to Know]

Physical vs Virtual Firewalls [What You Need to Know]

What type of firewall do you use at your organization? Firewalls control network traffic and prevent unauthorized access to the information they...

Read More