Page 112 - Cyber Defense eMagazine December 2022 Edition
P. 112

approach could allow business owners to apply the company policies down to the computers, be alerted
            when someone’s computer is faulty or get an alert to quarantine a threat.



            Zero Trust Access Policy

            As attackers get more sophisticated and are able to hide in a network and impersonate legitimate users
            it is table stakes to implement a zero trust solution. The solution is not a single device or application but
            applying the zero trust principal to all users and all traffic. This principle states that no user or network
            connection  should  be  allowed  access  to  a  network  or  application  without  first  confirming  who  is
            connecting, what their role is, and if their role had a need and the authority to access the network or
            resource.   Zero trust policy is implemented in firewalls, network devices, applications, and end point
            protection.

            Overall, downtime due to data breaches or non-compliance can cripple a business, causing financial
            issues and impacting one’s business operations. Relying on firewalls and antivirus software is no longer
            enough to protect an organization against threats – a holistic approach to cybersecurity needed. The
            solutions  mentioned  above  will  help  provide  a  well-rounded  approach  for  small  and  medium  sized
            business owners to have a more effective and safer network by looking for threats at the endpoint,
            firewall, or out into the edge of the carrier’s network.



            About the Author

            Jim Mundy is the Director, Security Operations at Segra. Jim leads
            the security operations center team of cyber security engineers
            and  analysts  who  are  responsible  for  the  full  lifecycle  of  Segra
            managed  security  from  policy  review  and  implementation,
            upgrades and changes, and repair support for Segra’s customers.
            The  SOC  team  at  Segra  also  manages  the  daily  care  and
            sustainment  of  the  firewall  platforms  and  security  applications
            used to deliver the managed security services. Jim and the team
            are actively involved in the development and roll out of new cyber

            security services and continuous improvement of the products and
            processes within the area of customer managed security.


            Prior  to  joining  Segra,  Jim  worked  as  a  Sales  Engineer,  Sales  Engineering  Manager  and  Product
            Manager  for  companies  in  the  telecommunications  and  managed  service  provider  space.  Jim  is  a
            Certified Information Systems Security Professional (CISSP) and has recently held Cisco professional
            level network and voice certifications. Jim has also worked as an entrepreneur - starting PaxNet, an ISP
            in  Greenville  South  Carolina,  which  he  later  sold  to  NewSouth  Communications.  Jim  began  his
            telecommunications career in a family-owned cable television company and has more than 20 years of
            experience in the industry.

            For more information about Segra, go to www.segra.com.





            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         112
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   107   108   109   110   111   112   113   114   115   116   117