Page 112 - Cyber Defense eMagazine December 2022 Edition
P. 112
approach could allow business owners to apply the company policies down to the computers, be alerted
when someone’s computer is faulty or get an alert to quarantine a threat.
Zero Trust Access Policy
As attackers get more sophisticated and are able to hide in a network and impersonate legitimate users
it is table stakes to implement a zero trust solution. The solution is not a single device or application but
applying the zero trust principal to all users and all traffic. This principle states that no user or network
connection should be allowed access to a network or application without first confirming who is
connecting, what their role is, and if their role had a need and the authority to access the network or
resource. Zero trust policy is implemented in firewalls, network devices, applications, and end point
protection.
Overall, downtime due to data breaches or non-compliance can cripple a business, causing financial
issues and impacting one’s business operations. Relying on firewalls and antivirus software is no longer
enough to protect an organization against threats – a holistic approach to cybersecurity needed. The
solutions mentioned above will help provide a well-rounded approach for small and medium sized
business owners to have a more effective and safer network by looking for threats at the endpoint,
firewall, or out into the edge of the carrier’s network.
About the Author
Jim Mundy is the Director, Security Operations at Segra. Jim leads
the security operations center team of cyber security engineers
and analysts who are responsible for the full lifecycle of Segra
managed security from policy review and implementation,
upgrades and changes, and repair support for Segra’s customers.
The SOC team at Segra also manages the daily care and
sustainment of the firewall platforms and security applications
used to deliver the managed security services. Jim and the team
are actively involved in the development and roll out of new cyber
security services and continuous improvement of the products and
processes within the area of customer managed security.
Prior to joining Segra, Jim worked as a Sales Engineer, Sales Engineering Manager and Product
Manager for companies in the telecommunications and managed service provider space. Jim is a
Certified Information Systems Security Professional (CISSP) and has recently held Cisco professional
level network and voice certifications. Jim has also worked as an entrepreneur - starting PaxNet, an ISP
in Greenville South Carolina, which he later sold to NewSouth Communications. Jim began his
telecommunications career in a family-owned cable television company and has more than 20 years of
experience in the industry.
For more information about Segra, go to www.segra.com.
Cyber Defense eMagazine – December 2022 Edition 112
Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.