traversing the network as well as what applications are in
use – so you know if someone is accessing the CRM system,
security feeds or simply watching Netflix.
Protection at the switch
The second line of defence is protection at the switch. A
three-pronged approach
Businesses should ensure that switch vendors are taking the
threat seriously and putting in place procedures to maximise
hardware protection. A good approach can be summed up in
a three-pronged strategy.
Make sure the switch operating system is verified by 3rd
party security experts. Some companies may shy away from
sharing source code to be verified by industry specialists, but
it’s important to look at manufacturers who have ongoing
relationships with leading industry security experts.
Scrambled code means one switch can’t compromise
the whole network. The use of open source code as part of
operating systems is common in the industry, which does
come with some risk as the code is ‘common knowledge’.
By scrambling object code within the switch’s memory, even
if a hacker could locate sections of open source code in
one switch each would be scrambled uniquely, so the same
attack would not work on multiple switches.
How is the switch operating system delivered? The
IT industry has a global supply chain, with component
manufacturing, assembly, shipping and distribution having
a worldwide footprint. This introduces the risk of the switch
N G
S I N C E
/CANNONT4
Micro & Mini
Data
Centres
in
Simple security solutions
The third point is to do the simple things to secure your
smart things. As well as establishing a more secure core
network, there are precautions you can take right now
to enhance device protection. It’s amazing how many
businesses miss out these simple steps.
Change the default password: a simple and often
overlooked procedure – change the default password. In the
Dyn case, the virus searched for default settings of the IP
devices to take control.
Update the software: as the battle between cyber
criminals and security experts continues, the need to stay up
to the minute with the latest updates and security patches
becomes more important. Pay attention to the latest
updates and make it part of the routine to stay on top.
Prevent remote management: disable the remote
management protocols,