Information
Security
Data
-
Regular backups to prevent data loss.
-
Backups of all important data.
-
Only data on the SMRU file server is regularly backed up. Any data on local drives of the computer is NOT backed up. Nor any data on an external hard drive nor a USB key.
-
-
Backups of BitLocker 48-digit recovery keys and passwords that are used to protect data.
-
-
Encryption to protect sensitive data.
-
All SMRU/TBHF computers must have all local drives encrypted.
-
Any data stored in the Cloud must be encrypted.
-
Network
-
Only SMRU/TBHF computers are allowed to have direct access or VPN access to the Private network.
-
Network access should be enforced using Port Authentication as MAC Authentication these days is considered to be insecure.
-
MORU has Port Authentication implemented, but SMRU/TBHF is still using MAC Authentication.
-
Personal computers are not allowed VPN access to the Private network.
-
However, anyone can install VPN software on their personal computer and copy the VPN configuration file from their SMRU/TBHF notebook to their personal computer.
-
Ideally the IT Policy should be updated and explicitly mention that VPN access from a personal computer to the Private network is not allowed.
-
-
Any other devices are only allowed access to the Guest network.
-
Access to the Guest network is only given when a user signs for a ticket.
-
-
However, at the SMRU clinics personal devices have access to that clinic’s network.
-
Access to the Private network at the main office is prohibited using Firewall rules.
-
Only some SMRU/TBHF servers at the clinics are allowed to have access to the Private network.
-
However, over time the Data Management department has requested access to the Private network from the remote clinics.
-
This has led to personal computers at the clinics also having access to the Private network at the main office.
-
Passwords
Before and Now
Before |
Now |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Before: Every device is secured and the IT Department is in control.
Now: Less than 50% of devices is secured and the IT Department is no longer in control.
Other Concerns
-
Any notebook may contain important data that is not backed up.
-
Any notebook outside the office is not protected by the firewall.
-
Any user can visit any website.
-
Any app/program/software can contact any (malicious) cloud server.
-
-
There exist many malicious browser extensions that can be installed by any user.
-
Data stored in the cloud should be encrypted, but in most cases isn’t.
-
USB drives get infected all the time when used outside the office.
-
To properly manage all passwords a Password Manager is needed.
-
Cloud based password managers provide a backup, but should have an offline mode in case internet is down.
-
When using an on-premises password manager, make sure to have a 3-2-1 backup strategy in place.
-
-
Authentication apps for MFA from Microsoft Store can be malicious.