New cyberattacks on networks keep appearing, but the basics generally stay the same. Understanding the broad categories helps you to keep track of the bewildering variety of tricks criminals use to break into networks. New application vulnerabilities keep turning up, but the fact of exploitable bugs has always been there. Schemers devise crafty social engineering tricks, but human carelessness and credulity were facts of life long before computers. A grasp of the big framework of network vulnerabilities helps you to understand how every new threat falls into place.
Penetration testing is an essential part of guarding against network vulnerabilities. RedTeam Security experts know the latest tricks and can determine if your network's defenses can hold them off. For a free consultation, call us today at (952) 836-2770.
At the broadest level, network vulnerabilities fall into three categories: hardware-based, software-based, and human-based.
Any device on a network could be a security risk if it needs to be managed appropriately. Routers and security appliances are the front lines of defense, but they require proper use. They need periodic firmware upgrades and should be replaced if patches are unavailable. Devices that IT management doesn't know to pose a risk.
One of the surest ways to break into a network is to gain unsupervised physical access to its devices. It doesn't take long to install malware on it. The intruder can download code from a prearranged location or copy it off a USB device.
The intruder can use the installed application as a backdoor or spyware. For example, it can log keystrokes, attach to a logged-in account, or monitor internal traffic.
Personal physical access isn't strictly necessary. Criminals have mailed malicious USB drives as "gifts" to potential victims. Once they're plugged in, they go to work installing malware.
Laptops, smartphones, and tablets are subject to theft. A stolen device gets the thief inside the network if it automatically connects to a VPN. Therefore, devices that regularly leave the office should be encrypted and have strong password protection.
The network firewall is its first line of defense. It can be a separate box, router part, or virtual device. It should open ports for incoming access only when they're supposed to be. Default configurations sometimes install unnecessary services. Unknown, unmanaged services are security risks. Most machines on a network do not need to run a server, and they shouldn't be able to.
A good firewall protects against blacklisted IP addresses and mitigates DDoS attacks. Many network managers have moved beyond traditional firewalls to web application firewalls (WAFs), which recognize attack patterns and block such requests. They can prevent SQL injection attempts, cross-site scripting, and other attacks. They're also known as next-generation firewalls.
One firewall is only sometimes enough. Networks with internal servers benefit from segmentation, keeping the machines that hold sensitive information away from the network's edge. A secondary firewall for the protected segment further reduces the chance of exploitable vulnerabilities.
Wi-Fi lets you connect devices easily without any wiring. Unfortunately, this convenience is also a vulnerability. A poorly secured Wi-Fi network lets nearby devices connect, bypassing the firewall. In addition, some networks set up access points without a password, creating two risks. First, anyone nearby can gain access. Second, Wi-Fi without a password is unencrypted, and devices are readily available to read incoming and outgoing traffic.
Wi-Fi access points with the default configuration, a widely used SSID, and a password everyone knows aren't any better. Passwords posted on walls for visitors to read are in the same category. Default settings make spoofing the network's Wi-Fi easier and lure users to rogue access points. Wi-Fi routers should have unique SSIDs and strong passwords.
"Shadow IT" access points are another security risk. If some areas have poor coverage, employees may connect their hotspots and not protect them adequately.
Too many Internet of Things (IoT) devices are cheaply made and need more security. Such devices are vulnerable points in a network. It's often impossible to configure them or update their firmware. The best solution is to avoid insecure devices and buy from reputable vendors. If there's any doubt, the devices should be segregated into a subnet that has restricted access to the rest of the network and no access to the Internet.
That last category leads to the general problem of unauthorized devices on the network. Employees, just trying to do their job better, sometimes put their own computers on the web or attach devices to them. The IT department needs to learn about them, making it harder to manage the network. In addition, they're rarely up to company security standards.
BYOD policies are on the edge. The IT department should set standards for acceptable devices, including software, to protect the device and the network. Allowing just any mobile device to connect, including ones with antiquated operating systems, opens up serious risks.
Other user-owned devices may likewise be acceptable if they serve a work-related purpose. Still, the IT department should vet them, and their access to the network should be limited if the network has strong security requirements.
Regardless of the policy, the IT department should keep an inventory of all devices and IP addresses. It can't address the security issues in a machine it doesn't know exists.
Now we come to the software side of network security. Even a simple network has machines with multiple operating systems and many applications. If any of them have significant flaws, intruders will exploit them and gain access to the entire network. As with hardware, it's only possible to secure what you know is there. Leaving applications wide open for anyone to use without limitation makes it easy to exploit flaws.
A typical application security problem is outdated software with known vulnerabilities. If it isn't up to date, it's a target waiting for someone to aim at it. Regular network vulnerability scanning can discover these problems so that the IT managers can install the latest security patches.
It's easy to forget about software that falls into disuse but does not entirely remove it. Plug-ins and add-ons on content management systems are especially prone to this. IT managers should be aware of all software that can be affected over the Internet and either maintain or eliminate it.
Some software, especially code written in-house, may have problems that need fixing. As a result, they're open to zero-day exploits. Sometimes there is no escape from this risk, but tight access control will limit the danger.
Shadow IT is a problem with software as well as hardware. Employees who put software on their machines without IT approval will likely create a security risk. The software may be risky, and most likely, no one is applying security patches. Users can even be fooled into installing a Trojan horse to infiltrate the network.
Sadly, this sometimes happens because IT policies need to be more relaxed. If employees can't do what they need by going through channels, they'll find other ways to get their jobs done. So instead, IT people should work with employees to find secure solutions to their problems.
Carelessness when configuring software opens the way for security breaches. An application's defaults generally optimize usability ahead of security. Default names for directories, files, and accounts give attackers a head start. Protecting administrative accounts is especially important. Changing the name of each admin account and restricting access to it will keep the chances of unauthorized access low.
Having a virtual private network is valuable. Because employees can access it from anywhere, there's no need to expose internal-use software to the Internet. However, a VPN has its security risks and configuring it is crucial.
Engineers can manage hardware and software issues, but human ones often seem intractable. The truth is human error is real, and people make mistakes. For example, people use weak passwords or need to guard them carefully. People open a phishing email and click links to malicious websites. Getting employees to follow a security policy and understand their organizational role can be challenging. But a strong security culture can be built when the initiative starts from the top.
On their own, people aren't great at devising strong passwords for themselves. It's inherent to want to create passwords that are easy to remember and use across multiple sites. If they forget, people commonly write down their passwords in an accessible and memorable location. In other words, somewhere that is easy to find, if not outright visible to themselves and others. Software can impose minimum password complexity requirements, but that helps only up to a point.
Multi-factor authentication significantly improves account security. Whether the second factor uses text messaging, a mobile application, or a specialized device, it keeps anyone from breaking in using just password theft.
Password managers encourage users to create hard-to-guess passwords since they don't have to remember them. A password generator and a password manager, used together, provide good account protection.
Trickery is a favorite way of breaking network security. Phishing messages, scam phone calls, and lookalike sites are some tricks for making people give up confidential information without knowing it. Security awareness training and testing make employees more alert to such schemes and less likely to fall for them.
Still, anyone can be fooled some of the time. The principle of least privilege reduces the damage when they are. Accounts should have only the permissions necessary to do the job. Only a few accounts should have unlimited access. That way, someone who breaks into an account can't get as far.
Guarding against network vulnerabilities is a complex, full-time job. Every device, every piece of software, and every person on the network can contribute to cybersecurity or be a risk factor. Therefore, regular reviews of security policies and practices are necessary. Employees must be aware of the risks and know how to avoid them.
Enlist an expert security team like RedTeam Security to maintain a strong cybersecurity posture. Our team has the skills and experience to discover the weaknesses in your network, so you can fix them before anyone else finds them. Call RedTeam Security at (952) 836-2770 to schedule a free consultation.