Building a Secure Infrastructure

September 9, 2018

Every business today wants to make sure they have a secure infrastructure. This is far from a simple process; however, there are some key points to keep in mind when developing a security plan.

  • Policy review: An important part of developing a secure infrastructure is conducting a policy review. This review should not be limited to just groups of employees gaining access to different network drives. Other important policies include equipment use policy, Internet usage policy, mobile device, and email policies. For example, malware is often introduced to a business via unsecured websites or email attachments. By developing and communicating comprehensive policies to all employees everyone can be a part of building a secure infrastructure. If your company does not have documented policies already in place this is one of the first items that should be addressed.
  • Server and network inventory: It is a good idea for the IT team to keep an updated server and network device list. It should include information such as name, its purpose, IP address, location, service tag/ID, warranty information, and operating system to name a few key facts. A good place to store this information is on SharePoint so it is in a centralized location. Knowing what is supposed to be on your network will assist with service, support, management and troubleshooting of your network.
  • Antivirus, anti-malware software, and patches: Every employee computer and server should have managed antivirus and malware prevention software installed and should be patched with the latest updates regularly. Any issues that develop during installing or patching should be documented for further review.
  • Develop naming conventions: Believe it or not, a naming convention is an important part of a secure infrastructure. By using standard naming conventions, it will be easy to identify files that are missing and require restoration. From a server or network standpoint, if there is an anomaly in the server logs, it will be easy to identify which server or network device has the issue.
  • Reliable UPS: Make sure all servers are connected to a reliable UPS. This is an important piece of equipment, especially if a backup generator isn’t set up. A UPS will give servers time to shut down properly if there is a power failure.
  • Independent HVAC system: Along with having a reliable UPS in place, it is equally important to have an independent HVAC system for the server room. If an air conditioning unit goes down in a building, the temperature will quickly elevate and put servers at risk.
  • User IDs and Password control: Whenever implementing a new piece of hardware, whether it is an employee computer or a new server, make sure to rename the local admin ID and create a strong password, never leave the defaults in place on any device, application or system. Make sure to enforce periodic password changes, even on service accounts.
  • Run regular backups: A thorough backup process should be developed and adhered to no matter what. And keep multiple backups in multiple places. Consider using the cloud mixed with off-site storage. A layered-approach to backups will provide the best data protection. Also, consider backing up the images of desktop and server configurations. This way if multiple computers require quick deployment, the image can easily be pulled off the backup and configured. If there are mobile users that store critical data on their laptop make sure to have a solution that encompasses this data.
  • Restoration tests: It is a good idea to periodically run restoration tests, even required for some regulatory compliance. Backing up information and configurations is important; however, if the data can’t be recovered, the backups are worthless. Make sure restoration tests are successful; and if they are not, work to resolve the issue immediately.
  • Seek help: This is a short suggestion list of tips for consideration when building a secure infrastructure. There is certainly a lot more to consider. This is why businesses shouldn’t try to go it alone. By utilizing an outsourced IT security company, a business will have a high level of expertise at its disposal. An external IT security company sees unusual scenarios every day and can utilize that knowledge in order to provide the best secure infrastructure plan possible.­

The All Covered Difference

All Covered is here to work with you to set up a comprehensive security plan. Our goal is to protect your company’s data by implementing a solid IT infrastructure. Contact us today at (866)446-1133 for more information or to schedule a consultation.

build a secure infrastructure

Drew Cataldo
Vice President of ITS Enterprise Accounts, V.P of Business Development, All Covered BCS