Focus on these Areas for a Secure Network Design

Physical Security
You might not chart physical security on a technical diagram, but physical security policy needs to be as specific as possible and communicated broadly – especially when the policy changes.

Organizations should set terms for accessing physical assets (stationary like servers or mobile like cell phones and tablets).
Policy documents should be tailored to those employees that have a need to access the hardware. Non-eligible employees should be alerted by emphasizing consequences for non-compliance.
Technologies that enhance physical security include RFID cards, premium locks, fingerprint reading devices, PIN pads and retinal scanners. Management may need to be advised that the company should not skimp on purchasing quality devices to enhance physical security.
Not to be overlooked: Any physical protection guarding sensitive areas around servers that hold critical business data.

If servers are off-site, the facility should provide documents containing their most recent security audits.
If servers are on site, multiple barriers to entry need to be created to protect data.
Unapproved access to encryption codes, network schemes, IP addresses or administrative user IDs and passwords could have a devastating effect on your company. MSPs and IT providers are encouraged to help their clients truly think through all of these physical components, even if the MSPs rarely visits the physical business location

Also read : lan manager

Comments

Popular posts from this blog

How to Invert Colors on Microsoft Office Picture Manager

Performance evaluation for proactive network management

What is the LM authentication protocol?