Search /
Advanced search  |  Help  |  Site map
Click for Layer 8! No, really, click NOW!
Networking for Small Business
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested

How to protect your network

Related linksToday's breaking news
Send to a friendFeedback

AttackerParaProtect, a network security portal in Alexandria, Va., reports that 90% of the security breaches its technicians work on are based on attacks from within. Even more shocking is that upwards of 50% are caused by the company 's own network administrators.

So what can you do to protect your network?

Here 's a list of tips culled from industry analysts, security experts, corporate executives and agents of the U.S. Secret Service:

  • Make sure no one person is controlling the system front to back.

  • Require every person logging on to use a password.

  • Assign supervisory rights to as few people as possible.

  • Back up all systems weekly.

  • Have a strict sign-in/sign-out system for backup tapes.

  • Always have a current copy of the backup tape stored remotely.

  • Do backups of desktops and laptops as well as servers.

  • Rotate backup tapes - don't keep using the same one over and over again.

  • Change passwords every three months.

  • Keep servers in a secured area.

  • Stay up-to-date on software patches.

  • Use intrusion-detection software that alerts you when you are being hit.

  • Make sure two pairs of eyes have checked code before it is entered into the system.

  • Have an information security department (at least one person and then one other for every 1,000 users) that is separate from the IT department and reports directly to the chief information officer.

  • Spend at least 3% to 5% of the IS budget on information security.

  • Train information security personnel to be aware of any employee who shows signs of being troubled or disgruntled, particularly if that employee holds an information-critical position.

  • Beef up security during certain events, such as mergers or downsizings, that could upset workers and cause them to lash out at the company.

  • Monitor the network - set up software that will alert you if the person is working in a different part of the network or at a different time than usual.

  • Scan e-mail to see what's going out of the company, double-check backup tapes and have someone else do the backups if that person is the one in question.

  • Make sure the person in charge of the system is not the same person in charge of the backup.

  • Have specific policies and punishments built into employee contracts.

  • Make sure critical IS workers are bonded.

How to protect your system if you're firing a network administrator:

  • Change everyone's passwords so he/she can't use them to break into the system.

  • Verify that your backup tapes are where they should be; make sure the information has been saved correctly and the tape is functioning properly.

  • Do a new backup.

  • Lock down every system that person had access to on the day of termination.

  • Have a new network administrator ready to step into the open position immediately.

  • Go up on the system and check user names and passwords, looking for anything unusual.

  • Make sure every logon has a password for it.

  • Lock down all the inside doors, such as the file servers, application servers and mail servers.

  • Look for backdoors on the system, such as Back Orifice on Windows NT.

  • Make sure there aren't any known vulnerabilities that haven't been patched - the administrator could have left those holes behind so he could get back in.

  • Strengthen your intrusion-detection system.

  • Set a trip wire - software that alerts the administrator to system anomalies, such as the size of a file changing.

Related links

The Omega files
Our main feature story.

G-men target e-crime
The Tim Lloyd computer sabotage trial may be the first of its kind, but agents at the U.S. Secret Service expect it won't be the last.

Legal system gears up for computer crime cases
With computer crimes expected to increase in both frequency and destructive power, the legal system will have to beef up its technical savvy to deal with the coming onslaught, according to industry and legal watchers.

The Tim Lloyd saga
Timeline of events.

NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.