- What We Do
- Software Development
- Data & Analytics
- Salesforce Consulting
- Who We Are
- Who We Serve
Software February 10, 2017
Copyright: vladimircaribb / 123RF Stock Photo
Technology and security can be a big investment – but the cost of recovering from a data breach is much bigger. Not just in terms of money (although it will be expensive) but also in terms of reputation. Customers and clients will lose some of their trust in you. That’s why it’s crucial to ask, is your server secure enough?
When businesses don’t take the proper steps to secure their servers, they risk being attacked in multiple ways. Hackers can give your network viruses, steal customer data, steal identities, and even shut down your entire system.
In a survey done by Forbes and BMC, 69% of senior executives stated that “digital transformation is forcing them to rethink their cybersecurity strategies” and 64% are willing to increase their spending if it means protecting themselves better against known security threats.
Cybercrime is still on the rise and shows no signs of slowing, so how can you be sure you’re taking the proper steps to secure your servers? Look over this checklist of 14 tips to make your servers more secure to see what more you could be doing.
Using separate servers for internal and external applications will reduce the risk of someone penetrating the external server to gain access to sensitive internal information.
Tweaking code and testing new features or applications on your main server can not only create malfunctions in your user experience, it can leave your servers vulnerable for a cyber attack. Allowing developers to test code on product systems can introduce security vulnerabilities while the untested code is being used. Therefore, it’s best to have a separate server for testing all together to add that extra layer of protection.
Software updates are not always about new features. Many times they include essential security updates. Running the most updated versions of all software will ensure you have the highest level of protection possible from your programs.
One common strategy hackers use to gain access to computer networks is they automate attempts to find the right password combination. SSH keys are an alternative login that are more secure than password-based logins. SSH keys use cryptography to authenticate remote computers and users.
Firewalls control what services are exposed to your network. They can block or restrict access to every port except for the ports you choose to make publicly available. Firewalls should be installed on all endpoints, meaning all web applications, servers and desktops.
Private networks keep your servers from being exposed to hackers by keeping the connection separate from external networks and the Internet at large. A VPN, or virtual private network, creates secure connections between remote computers while remaining private.
Public key infrastructure, or PKI, refers to the set of procedures and policies you can use to support, send, and manage public encryption keys. In addition to helping users and computers exchange data more securely over networks, such as the Internet, PKI adds another layer of security by authenticating the identity of the users or computers that are exchanging that information. PKI is used for any activity where electronic information needs to be transferred securely over a network, including (but not limited to) online banking, e-commerce and email.
An IDS is just what it sounds like. It’s software that monitors a system or network for unauthorized activity and then alerts you to the threat.
File auditing is when you compare the files in your current system to your record of files and file characteristics to detect changes to the system. File auditing can help you find suspicious files that may be hiding in your network undetected for the moment.
Secure FTP, or SFTP, is a file transfer protocol that uses authentication and encryption to enable secure file transfer between networked hosts. SFTP also provides remote file system management functionality.
Regardless of whether or not you send sensitive information via email, using secure email connections and encryption is important. Failing to secure email accounts could result in a hacker obtaining access to your network through your email. How can you be sure your email is as secure as it can be? Double check that:
Beyond the precautions suggested above for using secure email, highly sensitive emails should be encrypted using encryption software or a web-based encryption service, such as SendInc.
Web applications should always be scanned for vulnerability issues, such as cross-site scripting, SQL injection, and command injection, to name a few.
A vulnerable website can lead malicious users right to your server to do more damage. For more specific information about how vulnerable your website may be, check out our blog on cybersecurity best practices.
All the security measures in this list are necessary and important. However, one of the biggest things you can do is train your employees to recognize cyber threats. According to a report from 2015, the leading cause of data breaches is human error (37%). Someone clicks on a phishing link or opens a file that’s attached to an email, and suddenly your entire network is exposed. Make sure your employees know how to recognize suspicious threats and what your policies are for dealing with such threats.
Cybersecurity is a big concern for businesses this year. Investing in security costs way less than recovering from a breach. Using these tips will help make sure you are protected and keep your server more secure.
Contact us to talk about how we can help.