SlideShare a Scribd company logo
1 of 3
Download to read offline
WHITEPAPER
Security in the network environment
By Laura Niehaus, Project Manager, EES
Threats to network security are escalating dramatically. Technology advancements in social
media, mobile devices, wifi and cloud services are increasing a company’s vulnerability to attacks.
Cyber risks and cyber threats are a major concern for large revenue generating organisations.
ABOUT EES:
Established in 2001, EES provides management, engineering and auditing services.
As an ISO 9001:2008 certified company, we specialise in the integration of mul-
tiple system infrastructure including ICT, Data Centres, Audio Visual, Life Safety,
Security and Building Automation Systems. With over 180 successful projects to date,
EES operates predominantly in the Renewable Energy, Oil & Gas, Financial Services,
Infrastructure, Utilities, Telecoms and Mining sectors.
EES is committed to proactively assisting clients reduce their carbon footprint and
facilitate the development of a ‘green’ commercial environment. With offices in
Johannesburg, Cape Town and Stellenbosch, EES plays a key role in mission criti-
cal environments in Africa. Having successfully delivered on numerous international
projects, our clients, partners and stakeholders benefit from the company’s global
knowledge and expertise.
CONTENTS
Page 2	 Access Control
Page 2	 Key Threats to Network Security
Page 2	 Strategy Going Forward
I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 1
EES Cape Town office:
G11 Silverberg Terrace
3 Silverwood Close
Steenberg Office Park
Cape Town 7945
PO Box 31322, Tokai 7966
Western Cape, South Africa
Email: info@eeslive.com
Tel: +27 (0)21 702 8340
Fax: +27 (0) 86 532 4481
EES Johannesburg office:
Block A, Wedgefield Office Park
17 Muswell Road
Bryanston
Johannesburg 2021
PO Box 68383, Bryanston 2021
Johannesburg, South Africa
Email: info@eeslive.com
Tel: +27 (0)10 590 6270
Fax: +27 (0) 86 532 4481
EES Stellenbosch office:
18 Tegno Road
Techno Park
Stellenbosch 7599
PO Box 31322, Tokai 7966
Western Cape, South Africa
Email: info@eeslive.com
Tel: +27 (0)21 200 5939
Fax: +27 (0) 86 532 4481
Threats to network security are escalating dramatically.
Technology advancements in social media, mobile de-
vices, wifi and cloud services are increasing a company’s
vulnerability to attacks. Cyber risks and cyber threats are a
major concern for large revenue generating organisations.
It is therefore crucial for organisations today to become
more proactive and to invest in technologies that secure
their networks and company data. To mitigate the risk of
attacks, companies are now forced to improve security
policies, that will ensure employees abide by rules that
will protect the organisation’s technology and informa-
tion assets. These security policies are driven from the
highest level in an organisation with security profession-
als who are frequently advising on security matters and
compliance monitoring.
Even though organisations are moving in the right direc-
tion, there is still a need to analyse the current state of
security in the network environment and identify areas
of improvement. Health assessments focus on current
threats and also help recognise potential new threats.
Access Control
One of the ways in which network administrators control
access to company data is by assigning user names and
passwords. Standard security measures such as firewalls
and proxy servers enforce access policies allowing users
access to those services which they are entitled to.
Although standard measures are effective in preventing
unauthorised access, further systems are required to help
detect and prevent harmful content including:
•	 Intrusion detection systems should be used to 	
	 detect malicious activity or intrusion attempts by 	
	 outsiders and then log the activity for auditing 	
	purposes
•	 Perimeter networking or demilitarized zones (DMZ) 	
	 are also important in acting as a gateway to the 	
	 public Internet and provides services to users out	
	 side of the local area network, such as email
	 and web.
Security in the network environment
November 2013
Key Threats to Network Security
Data leakage, data loss prevention and data protection are major concerns.
Organisations usually cover data protection in contracts with third party
vendors who have access to the company’s data. Organisations should al-
ways implement enforceable contract clauses to make vendors responsible
and accountable for information security that aligns to ISO standards.
Employee negligence or lack of awareness also poses a serious threat to con-
fidential data. Organisations are developing and implementing policies to
ensure a more responsible attitude by employees to confidential information.
In large organisations it is important to increase the awareness of infor-
mation security, integral to which is training, in order to improve policies.
Employees need to be aware of their responsibilities and the correct use
of company assets and data. Companies must employ staff who have the
right skills and competencies to support security policies and to make infor-
mation security part of their performance assessments.
However, the trend of using personal smart devices for business purposes,
allowing company information to leave the premises without authorisation,
counters the principles of safeguarding sensitive data. Confidential data
leaks can be the result of misplaced smart phones or tablets. This enables
the introduction of malicious software into a company’s network, which
could present damaging consequences.
Strategy Going Forward
There is a great need to align security strategy with business strategy. It
is vital to be more proactive and explore new technologies that can help
prepare for the future.
Processes need to be documented and communicated when opportunities
for improvement arise, and budgets need to be made available to imple-
ment new security measures.
Organisations need to shift their focus to security improvements, which will
enable them to establish a framework for continuous improvement, proper
governance, process, training and awareness.
In conclusion, it is crucial to continually re-assess new technologies and
threats, and always remain vigilant and listen to what is happening in the
market.
I MANAGEMENT I ENGINEERING I AUDITING I
I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 2
Written by Laura Niehaus
Project Manager, EES
Tel +27 (0)10 590 6270,
Email info@eeslive.com
Laura has over 20 years’ experience in the
Information and Communication Technologies industry
Qualifications:
- MCom (IT) Wits University
Additional Certificates:
-	Data Communications 		
-	Marketing Management

More Related Content

What's hot

McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_HillDennis Hill
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Eryk Budi Pratama
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1Tanmay Shinde
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework- Mark - Fullbright
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information securitySsendiSamuel
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 

What's hot (20)

McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_Hill
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Ch.5 rq (1)
Ch.5 rq (1)Ch.5 rq (1)
Ch.5 rq (1)
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 

Viewers also liked

Marketing campaigns
Marketing campaignsMarketing campaigns
Marketing campaignschloesisson_
 
Evaluation task 3
Evaluation task 3Evaluation task 3
Evaluation task 3AC8594
 
지자체 지속가능보고서(SR) 발간 안내 (UN 국제기준에 따른)
지자체 지속가능보고서(SR) 발간 안내 (UN 국제기준에 따른)지자체 지속가능보고서(SR) 발간 안내 (UN 국제기준에 따른)
지자체 지속가능보고서(SR) 발간 안내 (UN 국제기준에 따른)tess99
 
Workshops for engineers to understand engineering more better.
Workshops for engineers to understand engineering more better.Workshops for engineers to understand engineering more better.
Workshops for engineers to understand engineering more better.Pradeep Aswani
 

Viewers also liked (10)

Unknown
UnknownUnknown
Unknown
 
Marketing campaigns
Marketing campaignsMarketing campaigns
Marketing campaigns
 
Evaluation task 3
Evaluation task 3Evaluation task 3
Evaluation task 3
 
지자체 지속가능보고서(SR) 발간 안내 (UN 국제기준에 따른)
지자체 지속가능보고서(SR) 발간 안내 (UN 국제기준에 따른)지자체 지속가능보고서(SR) 발간 안내 (UN 국제기준에 따른)
지자체 지속가능보고서(SR) 발간 안내 (UN 국제기준에 따른)
 
Workshops for engineers to understand engineering more better.
Workshops for engineers to understand engineering more better.Workshops for engineers to understand engineering more better.
Workshops for engineers to understand engineering more better.
 
публикация
публикацияпубликация
публикация
 
Comboio4
Comboio4Comboio4
Comboio4
 
blogger
bloggerblogger
blogger
 
Diarioficial
DiarioficialDiarioficial
Diarioficial
 
Lelang
LelangLelang
Lelang
 

Similar to Whitepaper: Security in the Network Environment

Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
World's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdfWorld's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdfInsightsSuccess4
 
With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...EES Africa (Pty) Ltd
 
Evolution of IT outsourcing.pdf
Evolution of IT outsourcing.pdfEvolution of IT outsourcing.pdf
Evolution of IT outsourcing.pdfMindfire LLC
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxPelorusTechnologies
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 

Similar to Whitepaper: Security in the Network Environment (20)

Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
World's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdfWorld's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdf
 
With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...With the evolution of technology, a comprehensive mobility strategy is impera...
With the evolution of technology, a comprehensive mobility strategy is impera...
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Evolution of IT outsourcing.pdf
Evolution of IT outsourcing.pdfEvolution of IT outsourcing.pdf
Evolution of IT outsourcing.pdf
 
Decode_Portfolio2016
Decode_Portfolio2016Decode_Portfolio2016
Decode_Portfolio2016
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
16231
1623116231
16231
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
CV 2.4 18/06/2016
CV 2.4 18/06/2016CV 2.4 18/06/2016
CV 2.4 18/06/2016
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 

More from EES Africa (Pty) Ltd

Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost HousingSustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost HousingEES Africa (Pty) Ltd
 
Carrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next DecadeCarrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next DecadeEES Africa (Pty) Ltd
 
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and ChallengesAfrica's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and ChallengesEES Africa (Pty) Ltd
 
Technological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African CitiesTechnological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African CitiesEES Africa (Pty) Ltd
 
Biomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated CorrectlyBiomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated CorrectlyEES Africa (Pty) Ltd
 
Give Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT AuditGive Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT AuditEES Africa (Pty) Ltd
 
An Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityAn Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityEES Africa (Pty) Ltd
 
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...EES Africa (Pty) Ltd
 
Video conferencing:Bringing together business colleagues from across the world
Video conferencing:Bringing together business colleagues from across the worldVideo conferencing:Bringing together business colleagues from across the world
Video conferencing:Bringing together business colleagues from across the worldEES Africa (Pty) Ltd
 
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013EES Africa (Pty) Ltd
 

More from EES Africa (Pty) Ltd (10)

Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost HousingSustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
Sustainable Solar Power-The Solution to Providing Energy for Low Cost Housing
 
Carrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next DecadeCarrying your Organisation and Technology into the Next Decade
Carrying your Organisation and Technology into the Next Decade
 
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and ChallengesAfrica's Industrial Scenario-Weighing up the Opportunities and Challenges
Africa's Industrial Scenario-Weighing up the Opportunities and Challenges
 
Technological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African CitiesTechnological Barriers to Implementing Smart Grids in South African Cities
Technological Barriers to Implementing Smart Grids in South African Cities
 
Biomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated CorrectlyBiomass - A Crucial Renewable Energy Source if Generated Correctly
Biomass - A Crucial Renewable Energy Source if Generated Correctly
 
Give Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT AuditGive Your Company the Competitive Edge by Means of an IT Audit
Give Your Company the Competitive Edge by Means of an IT Audit
 
An Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port SecurityAn Integrated Security System Optimises Global Port Security
An Integrated Security System Optimises Global Port Security
 
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
Proposed Increase in South Africa's Solar Renewable Energy Will Lead to Posit...
 
Video conferencing:Bringing together business colleagues from across the world
Video conferencing:Bringing together business colleagues from across the worldVideo conferencing:Bringing together business colleagues from across the world
Video conferencing:Bringing together business colleagues from across the world
 
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
An Ideal Mix of Technologies to Enable a Smart Grid: EES 25 July 2013
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Whitepaper: Security in the Network Environment

  • 1. WHITEPAPER Security in the network environment By Laura Niehaus, Project Manager, EES Threats to network security are escalating dramatically. Technology advancements in social media, mobile devices, wifi and cloud services are increasing a company’s vulnerability to attacks. Cyber risks and cyber threats are a major concern for large revenue generating organisations.
  • 2. ABOUT EES: Established in 2001, EES provides management, engineering and auditing services. As an ISO 9001:2008 certified company, we specialise in the integration of mul- tiple system infrastructure including ICT, Data Centres, Audio Visual, Life Safety, Security and Building Automation Systems. With over 180 successful projects to date, EES operates predominantly in the Renewable Energy, Oil & Gas, Financial Services, Infrastructure, Utilities, Telecoms and Mining sectors. EES is committed to proactively assisting clients reduce their carbon footprint and facilitate the development of a ‘green’ commercial environment. With offices in Johannesburg, Cape Town and Stellenbosch, EES plays a key role in mission criti- cal environments in Africa. Having successfully delivered on numerous international projects, our clients, partners and stakeholders benefit from the company’s global knowledge and expertise. CONTENTS Page 2 Access Control Page 2 Key Threats to Network Security Page 2 Strategy Going Forward I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 1 EES Cape Town office: G11 Silverberg Terrace 3 Silverwood Close Steenberg Office Park Cape Town 7945 PO Box 31322, Tokai 7966 Western Cape, South Africa Email: info@eeslive.com Tel: +27 (0)21 702 8340 Fax: +27 (0) 86 532 4481 EES Johannesburg office: Block A, Wedgefield Office Park 17 Muswell Road Bryanston Johannesburg 2021 PO Box 68383, Bryanston 2021 Johannesburg, South Africa Email: info@eeslive.com Tel: +27 (0)10 590 6270 Fax: +27 (0) 86 532 4481 EES Stellenbosch office: 18 Tegno Road Techno Park Stellenbosch 7599 PO Box 31322, Tokai 7966 Western Cape, South Africa Email: info@eeslive.com Tel: +27 (0)21 200 5939 Fax: +27 (0) 86 532 4481
  • 3. Threats to network security are escalating dramatically. Technology advancements in social media, mobile de- vices, wifi and cloud services are increasing a company’s vulnerability to attacks. Cyber risks and cyber threats are a major concern for large revenue generating organisations. It is therefore crucial for organisations today to become more proactive and to invest in technologies that secure their networks and company data. To mitigate the risk of attacks, companies are now forced to improve security policies, that will ensure employees abide by rules that will protect the organisation’s technology and informa- tion assets. These security policies are driven from the highest level in an organisation with security profession- als who are frequently advising on security matters and compliance monitoring. Even though organisations are moving in the right direc- tion, there is still a need to analyse the current state of security in the network environment and identify areas of improvement. Health assessments focus on current threats and also help recognise potential new threats. Access Control One of the ways in which network administrators control access to company data is by assigning user names and passwords. Standard security measures such as firewalls and proxy servers enforce access policies allowing users access to those services which they are entitled to. Although standard measures are effective in preventing unauthorised access, further systems are required to help detect and prevent harmful content including: • Intrusion detection systems should be used to detect malicious activity or intrusion attempts by outsiders and then log the activity for auditing purposes • Perimeter networking or demilitarized zones (DMZ) are also important in acting as a gateway to the public Internet and provides services to users out side of the local area network, such as email and web. Security in the network environment November 2013 Key Threats to Network Security Data leakage, data loss prevention and data protection are major concerns. Organisations usually cover data protection in contracts with third party vendors who have access to the company’s data. Organisations should al- ways implement enforceable contract clauses to make vendors responsible and accountable for information security that aligns to ISO standards. Employee negligence or lack of awareness also poses a serious threat to con- fidential data. Organisations are developing and implementing policies to ensure a more responsible attitude by employees to confidential information. In large organisations it is important to increase the awareness of infor- mation security, integral to which is training, in order to improve policies. Employees need to be aware of their responsibilities and the correct use of company assets and data. Companies must employ staff who have the right skills and competencies to support security policies and to make infor- mation security part of their performance assessments. However, the trend of using personal smart devices for business purposes, allowing company information to leave the premises without authorisation, counters the principles of safeguarding sensitive data. Confidential data leaks can be the result of misplaced smart phones or tablets. This enables the introduction of malicious software into a company’s network, which could present damaging consequences. Strategy Going Forward There is a great need to align security strategy with business strategy. It is vital to be more proactive and explore new technologies that can help prepare for the future. Processes need to be documented and communicated when opportunities for improvement arise, and budgets need to be made available to imple- ment new security measures. Organisations need to shift their focus to security improvements, which will enable them to establish a framework for continuous improvement, proper governance, process, training and awareness. In conclusion, it is crucial to continually re-assess new technologies and threats, and always remain vigilant and listen to what is happening in the market. I MANAGEMENT I ENGINEERING I AUDITING I I MANAGEMENT I ENGINEERING I AUDITING I www.eeslive.com 2 Written by Laura Niehaus Project Manager, EES Tel +27 (0)10 590 6270, Email info@eeslive.com Laura has over 20 years’ experience in the Information and Communication Technologies industry Qualifications: - MCom (IT) Wits University Additional Certificates: - Data Communications - Marketing Management