Who is Behind Your Firewall?

Disclaimer: The views and opinions expressed in this blog are those of the author(s) and may not reflect the official policy or position of Excelsior College. Excelsior makes no claim regarding the suitability of the content for all audiences.

Who is behind your firewall

Having only a perimeter defense is a bad idea, but knowing who is inside your company’s network is a key component of a solid defensive approach to cyber-security. Over the years, your organization may have allowed access to suppliers, customers, partners and many other groups that are not part of your core employees. Many times, this is done for legitimate reasons and for streamlining communications.

A full audit of access should be completed, and this area should be monitored on a continual basis for potential problems. A company I know had an attack happen that was traced back to some audio visual equipment that was installed on their network, but was accessible with no constraints from the outside. It languished for years and was the entry point for an attack.

About Pete O’Dell

Pete O’Dell is a business and technology consultant who has been involved with information technology and business for over 25 years, working for large organizations such as Digital Equipment Corporation and Microsoft as well as being involved in multiple startup efforts, including Swan Island Networks and Online Interactive.

Read Full Profile