To-Do List #01: Switch Hardening /w Commands

Change default login credentials (username and password) on the switchDisable unnecessary services and protocols on the switchEnable SSH or SFTP for remote management of the switch instead of using TelnetConfigure access control lists (ACLs) to limit network access to the switchEnable port security to prevent unauthorized access to the switchConfigure VLANs to segment the network … Continue reading To-Do List #01: Switch Hardening /w Commands

Encyclopedia of Cybersecurity Standards Chapter #1: Introduction

IT security standards or cybersecurity standards can assist organizations in identifying and implementing appropriate measures to protect their systems and data from cyber threats. Regardless of the size of the company or whether it runs business globally or domestically, cybersecurity is an important aspect of your company. In order for your customers to trust you, … Continue reading Encyclopedia of Cybersecurity Standards Chapter #1: Introduction