“IT managers should also be extra vigilant about their networks. It’s important that only the appropriate people are able access certain parts of the network. Establishing identity through secure authentication is key in the implementation of an effective security policy. For example, many damaging security breaches have been due to compromised user accounts and passwords exacerbated by users being provided with inappropriate levels of access. In addition to authenticating remote access, IT should also ensure that internal segmentation is in place to further protect valuable company IT assets. Segmentation is not new, but can be effective in providing extra security measures around key network components, such as servers that contain valuable intellectual property,” said Derek Manky, chief of security insights and global threat alliances for FortiGuard Labs at Fortinet, in the article.