Layer on the Security if You Want to Prevent Network Attacks

Layer on the Security if You Want to Prevent Network Attacks

By Bill Yates

Security threats are so pervasive these days you need protection against assaults at every layer of your network. With the changing nature of the workforce, combatting these ever-present security threats is an ever-evolving battle.

At the MSP Cybersecurity Theater on the Exhibit Hall Floor of ITEXPO held in Fort Lauderdale, FL, on Feb. 13, Daniel Deneke, Channel Manager at Contronex, discuss the need for layered security in today’s cloud environment. His talk was titled, “What is Layered Security and How Does It Protect Against Evolving Attacks.”

Cyberattacks are getting more sophisticated, but hackers’ main objectives haven’t changed much over the years. According to Deneke, cyberthieves’ main goals are to:

  • Steal your financial information;
  • Steal your personal information;
  • Use you as a tool;
  • Commit corporate espionage;
  • Expose your information.

The number one threat to your security remains the improper application of passwords. “People keep using the same passwords over and over again,” Deneke says, “It’s our biggest problem.”

Even with the advent of password management solutions, the increase in multi-factor identification and the introduction of biometric tools, bad passwords continue to plague IT managers. Other potential threats to the wellbeing of your system include:

  • Missing or poor encryption. Qualified staff is hard to find these days.
  • Web traffic. Attempts to penetrate your system continue to evolve.
  • Email. Phishing is alive and well, even thriving, Deneke says.
  • Cloud infrastructure. Plenty of security gaps in new construction.
  • IoT. The devices themselves are vulnerable, he says.

Potential threats develop from the inside as well as the outside, he says. With high-quality talent expensive and difficult to obtain, some security routines get pushed to the side. As part of his discussion, Deneke listed the major vulnerabilities faced by cloud-network users:

  • Zero-day exploits;
  • System misconfigurations;
  • Poor inhouse development;
  • Inadequate auditing.

More than 70 million phones were lost last year, Deneke says. Only 7% were recovered. Lost laptops, lost notebooks – with the mobile workforce now fully entrenched, the need is ever increasing for encrypting not just your network, but also your company’s mobile devices, he says.

Deneke says the solutions are out there, it’s just a matter of applying them. Solutions for maintaining your layered security include:

  • Attention to patch management;
  • Increased use of application controls;
  • Introduction of advanced anti-exploit software (ERD);
  • Imposition of regular system auditing.

“You don’t find out that someone has been crypto mining on your network until you receive the bill,” Deneke says. Better to continually monitor all your IT layers all the time, rather than pay that bill when it comes due.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Communications Correspondent

SHARE THIS ARTICLE
Related Articles

Foxit Brings AI to Document Analysis with New Research Agent

By: Erik Linask    7/3/2025

PDF and eSignature solutions provider unveils an intelligent tool designed to transform how users extract actionable insights from dense, complex docu…

Read More

OpenMSP Brings New Profitability to MSPs Driving an Open Source Revolution

By: Erik Linask    7/3/2025

OpenMSP, a community-driven platform seeks to liberate MSPs from unsustainable software licensing costs by leveraging open-source alternatives and AI-…

Read More

TD SYNNEX's Apptium Acquisition a Win for MSPs.

By: Erik Linask    7/3/2025

TD SYNNEX's acquisition of Apptium will simplify complexities of the XaaS, economy, offering MSPs new agility, accelerated time to revenue, and stream…

Read More

Real Estate Forecast 2025: Emerging Developments and Market Shifts

By: Contributing Writer    7/1/2025

Buying or selling property can be challenging. Rising mortgage rates and fluctuating home prices leave many uncertain about their next move. Business …

Read More

Protecting Business Assets with Smarter Security Frameworks

By: Contributing Writer    7/1/2025

Protecting your business is more challenging than ever. Cyber threats are increasing every day. Hackers target small and large businesses alike, searc…

Read More