Got BtoB Content Strategy tips from Melanie Rembrandt?

Securing Your Network in 5 Simple Steps

Read five simple steps startups can take to make sure their network and business-critical data is safe.

Hacking into computer networks is a growing threat in  today’s data-rich environment.  Business  owners continually see news of cyber-attacks and even recently customer credit  card data getting stolen.  The damages caused  by these criminals for any company can be severe, often  resulting in loses of millions of dollars.   While large corporations can sometimes withstand the attack, small  businesses must take preventive measures to secure their network from every  possible angle. This article will provide five simple steps startups can take  to make sure their network and business-critical data is safe.


  1. Use a Unified Threat Management (UTM) Device  Instead of a Router – Both a UTM and a router sit at a network’s gateway and is  usually the single point of entry in and out of the network.  However, that is where the similarities end.  A router performs simple routing of Internet traffic to and from the network.  Aside from hiding your internal IP addresses and maybe including in a basic  firewall, it does little else to prevent attacks and malware from entering the  network. A UTM device on the other hand performs not only routing, but also  provides layers of added security, such as:  

    1. Firewall
    2. Anti-virus
    3. Intrusion Prevention (IPS)
    4. Web filtering
    5. Application control
    6. Anti-spam

    These features at the edge of the network  are the most effective security layers an SMB can install to secure their  network.

  2. Create a Guest Network – You wouldn’t want house  guests to have access to your fine jewelry at home so why let guests at your  business have access to the critical servers that store your customer  information and credit card payments? Too many small businesses have one flat,  wide open network, and to top it off, there is only one wireless SSID where the  password is publically displayed on a piece of paper taped to a wall. This type  of network is called an “open house” just waiting for strangers to enter and  snoop around. To fix this, use VLANs to create a guest network that is  different from the main network.  Also,  create a wireless SSID for guests and map that SSID to the guest VLAN that was  created.  This is a simple ten minute fix  that can save businesses valuable time and money.

  4. Install Security Software on Laptops, PCs,  Smartphones, and Tablets – In today’s economy, employees are mobile, never  stationed at one place, but traveling throughout the city, state or country to  work.  Because of this it never hurts to  have more layers of protection and installing security software can be a lifesaver.  Threats targeting mobile devices are steadily increasing. This is the last line  of defense that should be on all mobile devices, and of course kept updated.

  6. Use a  Virtual Private Network (VPN) for Remote Connections Back to the Office Network  – Startups routinely need access to files stored on a server at work or access  to software applications only available on the office network.  If this is needed be sure to use a secure  VPN  for all remote connections back to  the network. Why VPNs you ask? First of all, remote users must first enter the  proper credentials to establish a VPN connection. Secondly, connections are  encrypted, making it very difficult for an unwanted third party to eavesdrop on  what goes on while an authorized user is connected. Correct use of VPNs ensure  that remote workers connecting back to the office do not put the network at  risk.

  8. Education, Education, Education – Quite often  when it comes to network security, there is heavy emphasis on how to keep bad  things out of the network. One aspect that is overlooked too often is the  importance of educating the users on Internet best practices. The dirty secret  is  more network threats are pulled in by  employees unknowingly than hackers finding their way through network defenses.  Having educational discussions with employees on the company’s Internet use  policy is often one of the best things one can do to keep the network safe.

The Internet is the life line of today’s business and  whether or not a startup succeeds or fails often hinges upon how well it is  able to leverage it. However, as the dangers in Internet usage exponentially  increases the five simple steps outlined above should be a nice starting point  on how to secure the network from these threats and prosper as a business.

Leave a Reply
Related Posts