Networks Europe May-Jun 2017 | Page 23

traversing the network as well as what applications are in use – so you know if someone is accessing the CRM system, security feeds or simply watching Netflix. Protection at the switch The second line of defence is protection at the switch. A three-pronged approach Businesses should ensure that switch vendors are taking the threat seriously and putting in place procedures to maximise hardware protection. A good approach can be summed up in a three-pronged strategy. Make sure the switch operating system is verified by 3rd party security experts. Some companies may shy away from sharing source code to be verified by industry specialists, but it’s important to look at manufacturers who have ongoing relationships with leading industry security experts. Scrambled code means one switch can’t compromise the whole network. The use of open source code as part of operating systems is common in the industry, which does come with some risk as the code is ‘common knowledge’. By scrambling object code within the switch’s memory, even if a hacker could locate sections of open source code in one switch each would be scrambled uniquely, so the same attack would not work on multiple switches. How is the switch operating system delivered? The IT industry has a global supply chain, with component manufacturing, assembly, shipping and distribution having a worldwide footprint. This introduces the risk of the switch N G S I N C E /CANNONT4 Micro & Mini Data Centres in Simple security solutions The third point is to do the simple things to secure your smart things. As well as establishing a more secure core network, there are precautions you can take right now to enhance device protection. It’s amazing how many businesses miss out these simple steps. Change the default password: a simple and often overlooked procedure – change the default password. In the Dyn case, the virus searched for default settings of the IP devices to take control. Update the software: as the battle between cyber criminals and security experts continues, the need to stay up to the minute with the latest updates and security patches becomes more important. Pay attention to the latest updates and make it part of the routine to stay on top. Prevent remote management: disable the remote management protocols,