Last month I got a call from the folks at VanDyke Software. They wanted to chat about what needs to go away to ensure enterprise network security.Last month I got a call from the folks at VanDyke Software. They wanted to chat about what needs to go away to ensure enterprise network security.Their list was, as one might expect, self-serving in some places (they sell software to fill some of the holes they think need to be created). But their list got me thinking about what else would be good to lose in the quest for a safer ‘Net.Here’s VanDyke’s list of things to lose: 1. Non-NT versions of Windows (95/98/ME).2. Password authentication. 3. Telnet.4. Cleartext logon to any root or administrator account.5. FTP (except in some cases, anonymous FTP).6. Failure to provide end-user training in basic security policy and procedures.7. IT departments fighting against the proliferation of wireless network access points.8. Government studies on how to secure the Internet. The last one might not be quite politically correct, and I don’t think they meant it literally. But, so far, such studies have been more feel-good exercises than meaningful guidance.The rest of their suggestions make quite a bit of sense, even though most are fairly obvious.Security 101 says to rid your network of anything that uses clear text passwords, and that is what suggestions 2 through 5 are all about.In spite of this being the first thing you should learn in network kindergarten, far too many networks are still being managed using good old telnet. Suggestion 2 goes a bit further to suggest using some additional logon techniques such as biometrics or token cards – a very good idea for critical systems. Even though current-generation Windows systems seem to be charter members of the critical-update-of-the-week club, the older versions give “porous” a bad name – it’s past time to get rid of them.Pretending that users will understand the importance and techniques of security without training is being in denial, at best.And it’s far better for the IT department to be on the forefront of installing wireless networks so that it can be done in a secure way. Wireless is just too useful to assume that an IT department dictate against it will stop progress.The VanDyke list is a good start, but I’d add a few things to it. For example, only half in jest, I would lose firewalls. They just get people thinking that they don’t have to practice good security hygiene.I’d also lose any network address translator that was installed for security reasons – NATs provide no meaningful security and make deployment of software innovations much harder.If I couldn’t lose “national security” as a network security driver – it’s just too important – I would lose it as an excuse to shred what is left of individual privacy in the workplace and on the Internet.Finally, losing the Digital Millennium Copyright Act would be the best thing that we could possibly do to improve the security of our systems and networks.Disclaimer: Harvard’s museums are full of things that people lost, but the above suggestions for more museum pieces are my own. Related content feature 5 ways to boost server efficiency Right-sizing workloads, upgrading to newer servers, and managing power consumption can help enterprises reach their data center sustainability goals. By Maria Korolov Dec 04, 2023 9 mins Green IT Servers Data Center news Omdia: AI boosts server spending but unit sales still plunge A rush to build AI capacity using expensive coprocessors is jacking up the prices of servers, says research firm Omdia. By Andy Patrizio Dec 04, 2023 4 mins CPUs and Processors Generative AI Data Center feature What is Ethernet? History, evolution and roadmap The Ethernet protocol connects LANs, WANs, Internet, cloud, IoT devices, Wi-Fi systems into one seamless global communications network. By John Breeden Dec 04, 2023 11 mins Networking news IBM unveils Heron quantum processor and new modular quantum computer IBM also shared its 10-year quantum computing roadmap, which prioritizes improvements in gate operations and error-correction capabilities. By Michael Cooney Dec 04, 2023 5 mins CPUs and Processors High-Performance Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe