Network Security & Cybersecurity Brief

Private and small business networks are under rapid and in some cases undisclosed changes to the infrastructure. Endpoint, IoT and Network devices are added to networks on a daily basis without pre-verification of conflictions with existing devices or security weakness verification. Security issues are plentiful and require attention and remedial actions implemented.

Security should be taken into consideration during all phases of design, development, build and deployment irrespective of the type of component, software, hardware, or firmware alike. Limits and boundaries are set by the limits of the device’s security. Scope negligence results in cross boundary weaknesses between opposing devices. Often a target will be exploited uniquely via another path, user or a device with vulnerabilities not considered as critical.

Security is as important as the functionality of the device itself, once comprised, normal functionally will no longer be possible except under certain attack conditions.

Cyber security and device security is under all common ownership responsibility, collaboration will support a sustainable normal working functionality.