In light of an article in computer weekly recently, more than half of UK businesses fear their mobile workers have been hacked and most are concerned a growing mobile workforce is equating to an increased cyber security risk to their business.
To what degree of attention have your remote workers paid to the security of their remote devices?
One way they could negate threats is to effectively isolate their internet network with a number of VLAN's implemented for different devices attributed with varied degrees of trust.
Network Isolation is physically or logically putting devices on separate networks and restricting how or if devices can communicate with each other.
You might ask yourself 'what threats may justify the need for network isolation?'
Well... if an attacker or malware manages to take hold of your network via your end-user environment, they can attempt to propagate an attack on you entire network infrastructure by attacking the other devices.
Network isolation will help mitigate this attack.
Things to consider in relation to network isolation – do you have untrusted devices on your network?
Maybe you have guests on your network. Maybe you have employees who are not as conscious about security as you are. Their devices may be infected. Perhaps a guest on their network is an adversary.
Untrusted devices can be used to propagate attacks.
However, it can be an administrative burden to ensure all of the above have been attended to. Therefore, you have to balance whether or not you think your IT team have the technical capabilities to configure network isolation correctly.
To discuss how effectively our level 2 and level 3 engineers can configure effective network isolation, mitigate threats to your end-user environment and reduce the risks, please contact us.
[Reference: Nathan House, Station X Ltd]
I’m sure you know yourself. You know your business. Of course you want to protect everything in it,
Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi
You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l
What business owners consider to be valuable assets will vary from one business owner to another bu