Cyber Summer - Hardware

Hardware

Which devices can access your business and itโ€™s data?

Introduction.

Business spaces are rapidly becoming much more flexible. Workers are no longer tied to a desk and their devices tethered to a cable. Both staff and visitors flow in and out of the business constantly, and expect to connect to a reliable local network when they do so.

But this can bring with it some issues.

How can you ensure the devices that are on your network are secure, or not bringing risks with them. And how do you ensure your authorised staff have access only to the data they need as they float between locations?

Network visibility.

The old adage is that what you donโ€™t know canโ€™t hurt you. But in cyber security the opposite is true. What you donโ€™t know is most likely to hurt you!

If I asked you how many devices are connected to your network right now, would you know? You could probably take a good guess at how many desktops and laptops you have in the business, but what about mobiles? How many people have a business device and their own device? If they know the wifi password whatโ€™s to stop them connecting both? And did you remember to include deskphones, printers, payment terminals, CCTV cameras and access control points? And what about the wifi access points themselves?

With so many devices already connected, and the number of devices likely to increase in future as everything becomes connected, from hoovers and mowers to kettles and toilets, knowing and controlling exactly what devices are on your business network is only going to become more important.

Thatโ€™s why network visibility is so important for all businesses.

How to get network visibility.

Finding out what devices are connected to your network is pretty easy, and you donโ€™t even need special permissions to do so.

    However, in order to properly understand and actively manage your network, both for security and efficiency purposes, you need visibility of much more than just what devices are connected right now.

    The right network visibility tools will give you much more depth of information, and greater powers over the network itself.

    Desirable network visibility data:

    • Total number of connected device.
    • Which network each device is connected to (eg. secure internal or public wifi)
    • Historical device connectivity data
    • Device action history (to spot errant behaviour)
    • Bandwidth usage for each device (spikes can indicate misuse)
    • Authorisation method/profile used

    Desirable network management tools:

    • Kick devices off the network
    • Set time-out limits for network access.
    • Blacklist devices.
    • Device discovery and notification.
    • Enforce more restrictive policies for newly discovered devices.
    • Restrict bandwidth (eg reserve bandwidth for business use).
    • Encrypted vs unencrypted traffic visibility.
    • Application use visibility
    • Set device policies for easier network management.

    Having the right Network Visibility or Network Management tools or services gives you greater control over your business network, and the data that flows within,

    By adding visibility, and then control, you greatly increase the security of your network and your ability to apply those all important policy controls.

    We can help:

    Our network management experts can help bring network visibility to your network.

    > Get in touch.

    I now understandโ€ฆ

    • Why it is important to know what devices are connected to my business network.
    • What network visibility is and how it can help with cyber security.
    Cyber Summer - Home
    You May Also Like: Business Leased Lines

    Request for your
    Cyber Summmer FREEBIES

    By clicking "submit", you agree to One2Callโ€™s Terms of Use as detailed in their Privacy Policy (www.one2call.net/privacy). You consent to receive emails, phone calls and/or SMS messages from One2Call in relation to your enquiry or order, and for marketing purposes upon opt in. Message frequency depends on your activity. You may opt-out by texting "STOP" to any SMS sent from One2Call or by clicking โ€œUnsubscribeโ€ on any marketing email sent by One2Call. Message and data rates may apply for any SMS sent.

    Contact Us

    By clicking "submit", you agree to One2Callโ€™s Terms of Use as detailed in their Privacy Policy (www.one2call.net/privacy). You consent to receive emails, phone calls and/or SMS messages from One2Call in relation to your enquiry or order, and for marketing purposes upon opt in. Message frequency depends on your activity. You may opt-out by texting "STOP" to any SMS sent from One2Call or by clicking โ€œUnsubscribeโ€ on any marketing email sent by One2Call. Message and data rates may apply for any SMS sent.

    Testimonials

    Harry Lynford, Image Data

    Great service and very helpful.

    Christina, Wildes Education

    Adam was really polite and respectful of the fact that I donโ€™t know a lot about computers and software.

    Aura Business Centre

    Helpful, professional and fast service always!