Table-Stakes-Security-Services-for-2023.JimMundy

approach could allow business owners to apply the company policies down to the computers, be alerted when someone’s computer is faulty or get an alert to quarantine a threat.

Zero Trust Access Policy

As attackers get more sophisticated and are able to hide in a network and impersonate legitimate users it is table stakes to implement a zero trust solution. The solution is not a single device or application but applying the zero trust principal to all users and all traffic. This principle states that no user or network connection should be allowed access to a network or application without first confirming who is connecting, what their role is, and if their role had a need and the authority to access the network or resource. Zero trust policy is implemented in firewalls, network devices, applications, and end point protection. Overall, downtime due to data breaches or non-compliance can cripple a business, causing financial issues and impacting one’s bu siness operations. Relying on firewalls and antivirus software is no longer enough to protect an organization against threats – a holistic approach to cybersecurity needed. The solutions mentioned above will help provide a well-rounded approach for small and medium sized business owners to have a more effective and safer network by looking for threats at the endpoint, firewall, or out into the edge of the carrier’s network.

About the Author

Jim Mundy is the Director, Security Operations at Segra. Jim leads the security operations center team of cyber security engineers and analysts who are responsible for the full lifecycle of Segra managed security from policy review and implementation, upgrades and changes, and repair support for Segra’s cu stomers. The SOC team at Segra also manages the daily care and sustainment of the firewall platforms and security applications used to deliver the managed security services. Jim and the team are actively involved in the development and roll out of new cyber security services and continuous improvement of the products and processes within the area of customer managed security.

Prior to joining Segra, Jim worked as a Sales Engineer, Sales Engineering Manager and Product Manager for companies in the telecommunications and managed service provider space. Jim is a Certified Information Systems Security Professional (CISSP) and has recently held Cisco professional level network and voice certifications. Jim has also worked as an entrepreneur - starting PaxNet, an ISP in Greenville South Carolina, which he later sold to NewSouth Communications. Jim began his telecommunications career in a family-owned cable television company and has more than 20 years of experience in the industry.

For more information about Segra, go to www.segra.com.

Cyber Defense eMagazine – December 2022 Edition

112

Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.

Made with FlippingBook Learn more on our blog