2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them. This also helps to detect strange traffic running across the servers
3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access.
4. Secure the Network: Access level assignments …show more content…
Frequently Schedule Vulnerability Scans: With the constant stream of attacks and bots looking and probing for new ways to gain access to the network, the NSA should perform regularly scheduled vulnerability scans, and often. Run a vulnerability scan such as: SecureCheq, Nexpose, or Retina CS Community
6. Off Site Backups: A new and very popular practice is to not only keep dedicated servers off site or in multiple locations to prevent the loss of one site taking down the system, but also, clouding.
7. Secure Remote Access: Specify which users can connect to your intranet through Remote Access, Set up a remote access server, Create a customized remote access connection or service profile. Use tokens, smart cards, certificates, or SMS solutions.
8. Secure the Wireless Network: Aside from using an SSID that can’t be easily associated with the company, also be sure to use the strongest encryption type you can, IE: WPA2. Also, set up a guest network so you can prevent visitors to even connect to your internal network.
9. Secure Email: Install Antivirus, Antispam, and Antiphishing scanning software on the network for both incoming and outgoing mail. Also, set up your devices to automatically reject directory harvest