IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Top 10 Network Security Threats

Vendor researcher includes USB drives, smartphones as top security risks.

With cyber-threats becoming a daily headache for IT security staff, it helps to have some advice, or at least know what to look out for. One researcher of Fortinet, a network security software provider, offered his observations on the top 10 threats that can harm networks from the inside and ways to combat them. And according to him, the number of threats just keeps growing.

“The ways that the networks can be compromised five years ago internally, certainly still exist. It’s just that today, that list is really growing, and that’s why this is ongoing research,” said Derek Manky, a project manager for cyber-security and threat research at Fortinet.

Manky said that the company has more than 100 researchers worldwide who monitor network activity.

“It’s really an ongoing case again of all this data that we’re seeing worldwide, all this feedback we’re getting, all the new threats that we’re seeing and how those threats can potentially affect systems,” he said.

According to the researchers, the top 10 internal network vulnerabilities are:

  1. USB drives
  2. laptops and netbooks
  3. wireless access points
  4. miscellaneous USB devices (digital cameras, MP3 players, etc.)
  5. employees borrowing others’ machines or devices
  6. the Trojan Human (attackers who visit sites disguised as employee personnel or contractors)
  7. optical media (CDs, DVDs, etc.)
  8. lack of employee alertness 
  9. smartphones
  10. e-mail
     
The list also includes advice for prevention and mitigation, with tips like implementing asset control policies to handle removable media threats and implementing an encrypted file system for sensitive data.

Some potential security threats such as smartphones can be dangerous in part because people don’t see them as threats. And even though they can house viruses, the devices can threaten networks in ways people may not think of.

“If you have any sort of confidential information and you have access to that, even if the document doesn’t leave the quarantined area and you take a picture of that with a smartphone, you can send that over [a] 3G network. You can just keep it on the smartphone and walk out with it,” Manky said.

But when it comes to locking down networks and implementing security protocols, Manky said the government may be in a different position than the private sector when it comes to enforcement.

“They have a heavier hand. They can enforce this and say, ‘OK, across all agencies, we are banning this until we can think of what’s going on with this.’ So that is a good thing in my view because if you can properly enforce something, and you can take action on that, then it’s a step forward,” he said.

But there could be drawbacks. In addition to policy “turf wars,” Manky admits that different sectors of government can cause confusion if they’re trying to enforce the same thing but have different ideas on how to go about it.

 

 

Miriam Jones is a former chief copy editor of Government Technology, Governing, Public CIO and Emergency Management magazines.