• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

How Cybersecurity Professionals Help Companies

A working cybersecurity CISSP explains how a cybersecurity professional can help companies secure their networks from unwanted attacks.

February 8, 2018 Terry Sadler 3 Comments

Cyber Security

For me or any cybersecurity professional to help you, we need to understand your infrastructure (networking hardware, operating systems, peripheral devices, application software in use, host-based security solutions in use, mobile devices in use, number of users, etc.). We will also need to look at the training needs for your workforce and policies that you have in place for your workers in regards to network access and use. And then we’ll have to look at the data that you are trying to protect. I know this sounds like a lot of information, but regardless of whether your business is large or small, there are a lot of things to take into consideration.

We can implement many configuration settings to secure your data, your network, and endpoints. However, unless your users are well trained and you have well-defined policies and procedures for your sensitive information and your network, you are sure to have weak links in your security.

I know you’re also concerned about email security, which is one of the most common ways used to enter a network. I’m happy to make some recommendations which will be easy for you to implement.

  1. Do you use commercial email providers such as Gmail, Yahoo, or Hotmail?
  2. Do you use an email service provided by your ISP?
  3. Do you have a private email server?
  4. Do you access your email using a browser or do you use an email client?

The answers to these questions will help determine the best way to help you improve your email security.

There are some easy steps you can implement today regardless of how you’re set up.

First and foremost, you need to understand how vulnerable you are when you do not exercise strict email hygiene. What I mean by that, is, you have to make sure that you do not open any attachments in email or click on links contained in emails that are unsolicited. You also need to be just as wary of attachments or links contained in emails sent to you by others you know because they may not be as disciplined as you are in their email hygiene. They may send you a cute PowerPoint, or a funny meme, or a hyperlink to an article they found interesting on some website. You never know which attachment or link is also going to contain an exploit that can infect your computer and your network.

You might be safe; you might not be safe. You need to educate yourself to understand SPAM and phishing emails. In this case, I would say that education and discipline are probably your best defense. I would also recommend you invest in host-based security software that will scan attachments in all your emails for malware.

I always like to give my potential clients something that will help them today, so I would like to leave you with these tips. In Louisiana, we would call this lagniappe.

Tips for Buying Cybersecurity Technology

Learn how to write a cybersecurity RFP, choose cybersecurity partners, and implement cybersecurity technology. Download this free report for all the details.

The Technology Manager’s Guide: Tips for Buying Cybersecurity Technology

Best Router Security Practices

  1. Change your router’s default password and make sure it’s a good complex password.
  2. Change the default admin ID if you can…unfortunately many consumer grade routers will not allow you to do this.
  3. Ensure you update the router’s firmware.
  4. Change the default network name for all three access modes (Ethernet, Wi-Fi 2.5 GHz, Wi-Fi 5.0 GHz).
  5. Setup WPA2 for your Wi-Fi and make sure you use a password that is complex.
  6. Disable any Guest access network when it’s not needed.
  7. Use parental controls if you want to establish hours of available Internet access for specific users.
  8. Setup and start using a DNS service like OpenDNS, Norton Connect Safe for Home, or Comodo Secure DNS to filter out pornography and other unwanted content.
  9. Enable logs so you will have access to reports that will help you troubleshoot problems.
  10. Set the maximum number of available IP address to the number of devices on your network.
  11. Enable MAC filtering to help ensure only those devices you specifically authorize can access your network or so you can deny the neighbor’s kid or the neighbor for that matter using your network without your permission.

I know some of my friends from the world of cybersecurity will say MACs can be spoofed…and so they can. But why make it easier when you can make it more challenging for someone to try and break in?

  1. Do administer your router using a Wi-Fi connection
  2. Disable “Access via Wireless” under “Local Management Access.”
  3. Disable Universal Plug and Play (UPnP)
  4. Ensure Wi-Fi Protected Access (WPA) is disabled
  5. Ensure your Firewall is enabled
  6. Disable VPN Passthrough unless you are in fact using a VPN to access your network.

I love small business owners and understand the financial constraints many of them work under. If they are on a tight budget but need help, I do everything I can for free or within their budget… I also point them to the NIST (National Institute of Standards & Technology) Special Publications (800) series focused on small business owners as well as my personal website. There are a lot of free resources developed for small business owners.

Terence “Terry” Sadler is a Certified Information System Security Professional (CISSP) in Alexandria Louisiana. Terry is the author of “Cybersecurity for Everyone: Securing your home or small business network” which was published by Signalman Publishing in January 2015. Written for the average computer user who does not have a background in computers or security; it has been a number one bestseller on Amazon in the Home Computer Network category and continues to be a bestseller.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Attacks, Cyber Security

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. cek tagihan rekening listrik says

    February 8, 2018 at 8:45 am

    Thanks for every other informative blog. The place else may I am getting that
    type of info written in such a perfect means?
    I have a venture that I am simply now working on,
    and I’ve been at the look out for such information.

    Reply
  2. Asus Support Number says

    October 6, 2018 at 7:12 am

    We can implement many configuration settings to secure your data, your network, and endpoints. However, unless your users are well trained and you have well-defined policies and procedures for your sensitive information and your network, you are sure to have weak links in your security.

    Reply

Trackbacks

  1. How Cybersecurity Professionals Help Companies – Security e-News says:
    February 11, 2018 at 10:49 pm

    […] How Cybersecurity Professionals Help Companies | #TpromoCom #cybersecurity #cybercrime | A working cybersecurity CISSP explains how a cybersecurity professional can help companies secure their networks from unwanted attacks. To read the remainder of this informative story, click here. […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.