New technology innovations emerge on a consistent basis, promising to solve productivity issues or streamline processes. The benefits make implementation appear attractive, until deployment is complete and the new application residing on the server poses new risks to the network. Fortunately, with the rapid adoption of cloud communications, many of these risks can be avoided.
Even with the migration to cloud communications, other elements still on premise can threaten the operation. While many current options available still appear to deliver value, they could actually open security holes, which could create a nightmare of an audit or lead to process issues for every user on the network. To help avoid these challenges, this GFI blog offered a list of things to avoid on the network.
DHCP Service: Everyone on the VLAN can be at risk with anything that runs DHCP. This broadcast service is often slower than newer devices and won’t likely meet customer expectations anyway. Cloud communications provides a safer alternative.
Open Sharing: When all other application installers share the same access through a directory of applications, it can quickly lead to a licensing nightmare when an exponential number of users access an application for which you only have 10 licenses. The true-up bill at the end of the year can leave you in the red.
Multiple Control Tools: Single remote control applications used to assist users and manage systems makes sense, but multiple tools for each different admin create a nightmare and leave the network at risk.
Bulk Email Tools: Unless you want to be quickly blacklisted, secure a satisfactory external bulk mailer server to manage your mass outgoing messages.
Password Cracking: Such tools may sound like a good idea, but they can quickly be run improperly and cause a lockout of each user on the network. These tools only work in the right hands at the right time.
Open Networks for Guests: The risks are simply too high, even if the open network is separated from the internal network. Instead, use a captive portal to run IDS on the guest network so it’s still controlled and cannot be abused.
Out of Date: Anything that is no longer supported by the vendor or manufacturer should immediately be removed from your network, no matter how skilled your IT manager.
Unlimited Alerts: Anything that has the capacity to send an unlimited number of alerts can easily overload the system. Alerts are a good thing, but they need to have reasonable limits.
Bittorren Applications: If the Bittorrent is misconfigured, clients quickly use too much bandwidth and easily impede the experience for other users.
Software for Security Auditing: This software should only be installed on the security professional’s workstation to be effective and not put the whole network at risk.
With so many elements threatening the network, the argument for cloud communications is even stronger, eliminating much of the risk and creating a more efficient environment.
GFI Software will be exhibiting at the ITEXPO West 2012. To be held Oct. 2-5 at the Austin Convention Center in Austin, TX, ITEXPO (News - Alert) (News - Alert) offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations.
Small to mid-sized businesses are under attack
Until small to mid-sized businesses (SMBs) take proactive, measurable improvements to IT security, many will succumb to cyber criminals...
The Technology Trap: How your business can break out and step up
Technology management itself can be a time-consuming exercise and requiring a lot of administrative time...
Unlocking the benefits of managing IT services in the cloud
Managing IT can quickly become a logistical and cost headache for organizations of all sizes...
A business case for cloud-based IT management
Cloud computing services have seen rapid adoption among organizations of all sizes...