Security Q & A | Page 2


We've now reached the User layer in our Layered Security series. This article is part one of two, because there's a lot going on with this layer. If you haven’t been following this series, you can catch up by using the link above or by checking out the PDF version, which contains all previous articles.   The User Layer (Part 1) We’ve finally reached the user layer, which in many ways is the most important and also the most difficult. As mentioned before, 80-90% of the threats to your network can come... [Read More]
by RSS Victoria Martin  |  Apr 18, 2015  |  Filed in: Security Q & A
Next up in the Layered Security series is the Device layer. If you haven’t been following this series, you can catch up by either reading my other blog posts (using the link above), or by checking out the PDF version, which contains all articles that have been written up to this point. The Device Layer While wired networks certainly have their own challenges (many of the precautions here are applicable to wired devices), it is wireless that really changed this layer’s landscape. The biggest change that came with wireless... [Read More]
by RSS Victoria Martin  |  Jan 28, 2015  |  Filed in: Security Q & A
In this entry of the layered security series, we look at layer 3, the network layer. The network layer Network layer security focuses on external threats that are able to bypass the firewall layer. Your FortiGate has two main features that deal with these threats: the Intrusion Prevention System (IPS) and Denial of Service (DoS) protection. What are IPS and DoS protection? IPS protects your network by actively seeking and blocking external threats before they can reach your network devices. These attacks are able to bypass the firewall because... [Read More]
by RSS Victoria Martin  |  Nov 22, 2014  |  Filed in: Security Q & A
It's time for part two of our look at firewalls, as we continue our series on layered security. The first part can be found here. Firewall Policies: How to Build a Better Policy As networks become more advanced, so do the demands placed upon your firewall. As such, it is equally important to know how to make a firewall policy work, and to make it work well. Improve Your Design Just because a firewall policy works doesn't mean that it's design is perfect. Since firewalls play such a key role in keeping your network secure, it's important to... [Read More]
by RSS Victoria Martin  |  Jul 11, 2014  |  Filed in: Security Q & A
Web Filtering is one of your first lines of network defense, preventing known threats from reaching your network so your other security features can handle the unknown threats, and preventing users from accessing content that could be distracting, a drain on bandwidth, or a liability risk. Below is a collection of videos to introduce you to Web Filtering, using FortiOS 5.0. User-specific Web Filtering This video introduces you to the concept of web filtering, and provides an example of how it can be used to grant or limit access based on user... [Read More]
by RSS Jonah Davidson  |  May 08, 2014  |  Filed in: Security Q & A
Now that we've had a look at layered security, it's time to talk about each layer individually to figure out the steps you should take to secure your network. First and foremost is the DNS layer, the first "wall" of security that protects your network from attacks. DNS 101 Domain Name System (DNS) is used like a phonebook to help your computer find websites by translating a domain name to a website's IP address. For example, the domain name www.fortinet.com is translated to the IP address 66.171.121.34, which lets your computer successfully... [Read More]
by RSS Victoria Martin  |  Mar 03, 2014  |  Filed in: Security Q & A
Your FortiGate has just arrived. You've taken it out of its box and connected it to your network. All you need to do now is configure it to protect your network, which raises some questions: what features should you use, how should you use them, and most importantly, why? Before we get into the specifics, let's take a quick look at Fortinet's role layered security and how it can protect you. What is Layered Security? Layered security combines multiple security measures to make sure that you don't have all your security eggs in one basket. This... [Read More]
by RSS Victoria Martin  |  Jan 14, 2014  |  Filed in: Security Q & A
A: Email is totally insecure. Despite this fact, it is relied upon for some of our most critical personal and business communications. Circa 1980, The Simple Mail Transfer Protocol (SMTP) was designed without even a glimmer of what the internet would become. Security was not as paramount a concern as it is now; it never made it into the protocol. Changing this has been an uphill struggle due to the sheer number of mail servers and users who rely on them. Even today, by default, email is sent in plain text (if both servers do not already use... [Read More]
by RSS Carl Windsor  |  Nov 14, 2013  |  Filed in: Security Q & A
A: Reset your password and security questions, run a virus scan, and hope for the best. Beyond the basics, there are a few more considerations when your Gmail (or any other account for that matter) has been breached. Google offers two-factor authentication, enabling this should be one of your first steps. Two-factor authentication requires anyone logging into your account to not only know your username and password, but also retrieve a time sensitive token. This security token is usually a 5 digit number sent to your cell phone or your... [Read More]
by RSS Michael Perna  |  Oct 04, 2013  |  Filed in: Security Q & A
A: The simplest answer is to make yourself a difficult target. Best case practices like patch management and using a basic firewall are easy ways to prevent basic snooping. Having the most up to date patches installed can, more often than not, resolve a majority of basic security vulnerabilities. Patch management is as fundamental to your security posture as changing the oil in your car. Being proactive about it is the veritable low hanging fruit when it comes to filling in security cracks. Adding a basic firewall on your network can make... [Read More]
by RSS Michael Perna  |  Sep 25, 2013  |  Filed in: Security Q & A