The National Security Agency suggests security should be designed assuming there will be breaches

November 7th, 2011

The National Security Agency (NSA) has suggested that security systems must be built with the assumption that there will be breaches. No matter how good a firewall that is purchased, or whether you have "the best" anti-virus, there is some way around each level of security. It may be social engineering tricking your users into bringing a trojan into the organization via a web page or an email. It may be infected PDF files. It may be infected USB sticks. It might be an employee gone bad. It might be a coordinated attack. A well designed system provides multiple layers of defense. If one fails, hopefully one or more other defenses will catch the intrusion.   Also hopefully even when sitting on the inside of your organization, the intruders will still find barriers limiting what they are able to see and do.

CSI offers firewalls which look at traffic going in and going out. The firewall examines it for unusual behavior as well as getting traffic signatures (much like anti-virus) that helps identify known malicious traffic. We offer web filters to keep users from clicking on known malicious links. We have anti-virus and anti-malware to provide centralized reporting and updating of what is really going on in your organization. We have 24x7x365 remote monitoring with our Paladin monitoring offering. We have email spam and virus filtering.  We can design an appropriate level of security for your servers, workstations, switching and wireless infrastructure and your remote access requirements to balance security against functionality.

Keeping your organization and data safe is not a one-time decision. It is an ongoing process that requires constant monitoring of what is going on and periodic review of whether the implementation holds up to current threats. Contact us to discuss how we can help improve your organization's computer and network security.

You can read the entire eWeek article on the NSA comments here:

Leave a comment!

You must be logged in to post a comment.