Posts

How to Get an A+ in Network Security for Your School

Schools are responsible for not only the education and well-being of students, but also the protection of private data pertaining to everything from health reports and psychological profiles to social security numbers and contact addresses.

As the guardians of so much information, schools should always focus on superior network security.

We’ve come up with three major network security features you can implement in your school to shore up potential ongoing vulnerabilities.

1.) Powerful Passwords

For many students, creating passwords at school can seem like another exercise in creativity. Do any kind of basic survey and you’ll find ineffective passwords that range from the doomed “Password1234” to the sarcastic “JohnnySucks.”

In addition, many teachers lack the technological prowess to instruct students in proper password complexity.

Think of an inadequate password’s effect on your network security like this: You can have an adequate lock on your front door, but if you’re leaving the key underneath the doormat it doesn’t do much good. It’s too easy.

A lazy password is a hacker’s best friend.

The most basic way to secure your network is to create longer, more complex passwords. Complicated passwords should include a mix of upper and lowercase letters, numbers, symbols, and emoticons.

Business Insider suggests creating a password by using the “full-sentence technique.” Start with a single sentence, like “I bought salmon for $20 at the grocery store.” Then, just use the first letter of every word and add in the symbols.

So, the resulting phrase “Ibsf$20atgs” would be a random password that you can remember just by memorizing one sentence.

The longer the sentence, the better, because hackers and/or hacking programs have to work harder when passwords are longer.

Utilizing a password manager to keep track of your stockade of complex passwords is a great way to combine the ease of accessing your various web services as if you had one password with the security that password complexity and variety provide.

Related: The Best Password Managers of 2018

2.) Additional User Authentication

A school network faces a huge challenge in that it is often in contact with a countless variety of devices. Not only do the students and faculty have access to the network via district-provided hardware, but the continued growth of the BYOD (bring your own device) trend means that students are connecting through personal phones, tablets, and laptops created by different brands, which also run on different operating systems.

To further increase security, we suggest implementing multi-factor authentication (MFA). In a nutshell, MFA is the process of identifying an online user by validating two or more claims presented by the user, each from a different category of factors.

We already use multi-factor authentication in the real world. One example is when you go to apply for a passport. The passport application requires a minimum of two forms of identification, such as a state driver’s license and a birth certificate. MFA for your network works the same way.

Your school network should establish a multi-factor authentication process that involves:

a.) The complex password we mentioned earlier.

b.) Something the user has on hand, like a cell phone or tablet.

c.) Biometrics like a fingerprint or optical or voice recognition software.

 

When the MFA process involves a device on hand, there is an inherent check-and-balance to the system, allowing the network to authenticate the device being used.

When the MFA process involves biometrics, your network can cross-reference requested access with the biometric data on hand.

Whichever way you and your managed service provider choose to utilize multi-factor authentication, it is guaranteed to make it more difficult for intruders to gain access to your network, and to keep your data more secure.

3.) Updated Infrastructure

Many schools have hundreds of computers and other web-accessible devices operating on their networks. And often, the network itself is comprised of legacy equipment such as outdated servers, computers, and other devices.

Often this outdated infrastructure has security flaws. Or else it can no longer stand up to the progressive threats of malware and ransomware. It can also be chock full of bottlenecks and bandwidth issues that slow performance across the network.  But that’s an issue for another post.

Related: Why Traditional Firewalls Can’t Keep up With Modern Trends

For many schools, a migration to the cloud is the best way to shore up vulnerabilities while simultaneously fixing the performance problems plaguing their network.

Rather than making a high capital investment in replacing the vulnerable outdated equipment, switching to cloud computing means taking on a lower monthly cost for superior performance and security.

It can even bring about more powerful web filtering tools that block access to harmful or inappropriate sites across the network.

Report Card Time

Do your school passwords pass the test? Are your students and faculty using multi-factor authentication to ensure the safety of your network? And is that network up to modern security standards? If so, you pass with flying colors. If not, it’s definitely time to chat about how to get your grades up.

 

The Prescription for a Perfect Managed Service Provider

Managing the health of a network can be a lot like managing your own health. If you want to be super healthy, you’ll make sure to do the right exercises, take the appropriate vitamins, and avoid possible risks. The same goes for managing a network. Here’s our prescription for what to look for in the Managed Service Provider that’s right for you. Check off everything on this list and you’ll be closer to an ideal IT support solution.

Pick an MSP that has experience in your industry.

Every industry has specific business needs and challenges. Many IT service companies will offer solutions that are the network equivalent of those modular homes that popped up all over the place in the 1950s. Unfortunately, a one-size-fits-all approach to networking just doesn’t work when one business is a hotel and the other is a hospital. Often, the result of a makeshift network is large-scale data compromise.

The Ponemon Institute found that 64 percent  of patient medical files were successfully targeted by cybercriminals in 2016. Since medical data is not the only type of information commonly compromised, a healthcare company would want a Managed Service Provider who understands their special risks and vulnerabilities. An MSP that has worked with companies in your industry is far more equipped to build a customized solution that will meet your every need and protect your data

Pick an MSP that offers full-service support

You all have a friend that has “a guy” for everything. He has one “guy” who will come over and spend time physically connecting a network. He’ll have another “guy” who pops in for repairs, and yet another “guy” for those late-night server issues. When you pick an MSP, you want to just have the one “guy” to call – one who is backed by a team of specialist “guys” who can handle whatever you need and guide you through challenges.

Think of your MSP as your morning multivitamin. Instead of swallowing 19 pills, you’ll just have the one to keep you healthy and strong. The best MSP for your business should offer security and threat management, networking monitoring, and cloud services.

Pick an MSP that is available for you

A managed service provider may have all of the capabilities you are looking for, but it won’t do you much good if certain technicians are only available during limited hours. High on your checklist should be a company’s ability to support you after hours, during an emergency and just whenever you need some planning assistance. The best MSPs are just like the best doctors; they work on a preventative basis to stop problems before they happen. That being said, just like you’ll sometimes need to make an urgent appointment, you want to make sure your MSP is set up to give you the right assistance during on-call situations.

In any industry, downtime is a disaster. A survey by ITIC reports “98% of organizations say a single hour of downtime costs over $100,000; 81% of respondents indicated that 60 minutes of downtime costs their business over $300,000. And a record 33% of enterprises report that one hour of downtime costs their firms $1 million to over $5 million.” These are the numbers you want to think about when you are considering your MSP’s availability.

We’d be happy to give your network a check-up. Please give us a call or send us an email to see how we check out.

Tubular Totality

The Tubes

Image: The Tubes by Kendrick Erickson (CC BY 2.0)

Underwater fibre optic cables currently carry approximately 99% of global telecommunications and data traffic. In addition to Internet services, many important things in our lives such as food, clothing, electronics, news, transportation, health care, banking and global commerce are directly or indirectly made possible by this technology.

Continual advances in data compression and transmission techniques ensure there is plenty of capacity for future growth. Despite this, and the substantial installation costs, new cables are regularly laid to provide redundancy for uninterrupted connectivity.

But did you ever wonder where the technicians tunnel these magic sea tubes which help transport your trucked Internet? The following updated 2014 submarine communications cable map by Teleogeography shows current and planned global oceanic Internet cable connections. It really is happening under the sea.

 

Data flow management, network administration, cabling, data storage and disaster recovery require expertise. Every business is different, and there’s no one-size-fits-all solution. To learn more contact RWA today and schedule your free IT health check.