The document discusses securing an organization's IT perimeter. It begins with an overview of common vulnerabilities like open ports, out of date software, and weak authentication processes. These vulnerabilities can be exploited by attackers to breach the network. The document then provides recommendations for protecting the network, such as minimizing open ports, aggressively patching software, using firewalls and routers to control access, implementing separate wireless networks for staff and guests, and using remote desktop or VPN for remote access. It concludes with contact information for questions.
2. WHATS ON TAP?
What is my Perimeter?
Common Vulnerabilities
How do I protect myself?
Routers and Firewalls
Wireless and Guest Access
Remote Access
Q&A
2
8. 8
MINIMIZING OPEN PORTS
- FEWER SERVICES?
- MAYBE THE CLOUD
PEOPLE
- LETS GET BACK TO THIS ONE
AGGRESSIVE SOFTWARE PATCHING
- SERVERS
- WORKSTATIONS
- APPS
AV VS IDS
AUTHENTICATION
PEOPLE