16 Feb Cybersecurity recommendation | 1 | Setting up a Threat Management System to stop malicious insights
The problem :
The internal network of my company is connected to the Internet, this is essential to the development of my activities. On the other hand, my business is directly exposed to cyber threats. What is the first step I must take to protect my network and my workstations?
5 key recommendations you should keep in mind
- Threats can easily hijack or exploit authorized traffic to pass through a filtering device like a firewall, make sure that your firewall provides security engines that analyze incoming and outgoing connections to prevent these threats.
- Access permissions must rely on user identities or user groups in order to match your organization.
- Your internal network should be segmented into several zones, depending on the criticality and exposure of your resources and the traffic between zones should be enforced by the firewall.
- Ensuring visibility over your network is key to identify anomalies or abnormal behaviors. Don’t forget to activate the logging capabilities of your firewall and review the logs on a regular basis.
- If your firewall provides such a capability, activate the automatic coherency check to detect configuration errors or weaknesses in your filtering policies.
Download and consult our Cybersecurity Guide for more recommendations: