Faq

You have questions? We have answers!

(908) 388-5324 Get in Touch
Two men taking notes and smiling

Frequently Asked Questions

How do I protect my network from the influx of new devices?

Consider investing in Network Access Control and Identity Management solutions. This will simplify network access management by streamlining policy deployment to specific user profiles. Pre-configure role access and deploy it to the users that need it, blocking those who do not meet the criteria. This is especially important for work from home environments where users should access only what their roles allow them to access; no more, no less. This will help you protect data from insider threats and help prevent accidental data leaks.

How can I get started with Network Access Control (NAC)?

First, you need to understand your attack surface; everywhere people are trying to access your network. Then tighten your security policy to define where, how, to whom and under what circumstances you will grant network access. Lastly, choose a NAC solution from a knowledgeable partner and determine how you will phase NAC into your environment. We’ve found the best results when beginning with one type of access such as wireless access, or group of users such as operations, and then methodically moving through the rest of the deployment.

If you aren’t sure where to start, check out our security risk assessment offering. It can help you identify where you need to improve your access policies, and whether your current practices are creating vulnerabilities.

What is Zero Trust and why do I need it?

Zero Trust is not a product. It is a security approach or methodology. In the past, networks, server ports, etc. were open by default and IT teams would close them to traffic they didn’t want to allow. With the proliferation of security threats, the old strategy no longer works. Today, you should start with Zero Trust, everything closed to everybody, and then open access to only those people and devices that you know and trust.

This methodology restricts access from non-compliant devices, and strictly adheres to access standards. Users are granted specific access based on their roles and permissions. This strategy is important because it limits data leaks due to insider threats, while protecting privileged data. It’s an efficient method for improving access visibility and simplifying security management because you know who is accessing what, and when.

How do I know which security solutions will provide the most value to my organization?

Consider the following steps:

How often should I refresh my wireless technology?

As wireless technology continues to evolve; we are seeing the need for more frequent technology refreshes to maintain secure networks. An ideal refresh rate would be every 3 years, but we see many organizations are at the 5–7-year mark. More frequent refreshes are relevant because as technology advances, so do the cyber threats. Outdated hardware or software could make an organization more susceptible to a breach. Where privileged data is concerned, a breach could result in a big fine.

How do I secure my mobile users' devices?

First, you’ll want to consider what type of devices you’re needing to secure. For example, if you need to secure your mobile employees laptops, you’ll want to consider these solutions: VPN